Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 05:16
Behavioral task
behavioral1
Sample
2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe
-
Size
350KB
-
MD5
2f1b5739d51a5814da909446f22e9f3f
-
SHA1
d3c9db71d05264e0b6f77538da49a765eb2399d7
-
SHA256
979eccf3ea029ce6bf70b0f7ceb7d85523c7b58b7f3baa554f9575d4b4da3b58
-
SHA512
f8d04b8c45f845ca84594e42ccb57444131ba517820e475817e4bbb6fe957246905e3407f92ae865495b8acec9618504eed093726870e2fefe7a4bc2712f886a
-
SSDEEP
6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kIQ4Wh:QjkArEN249AyE/rbaMct4bO2/VAx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2248 server.exe -
Loads dropped DLL 5 IoCs
pid Process 884 2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe 884 2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe -
resource yara_rule behavioral1/memory/884-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/884-17-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/884-17-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2872 2248 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 884 wrote to memory of 2248 884 2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe 30 PID 884 wrote to memory of 2248 884 2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe 30 PID 884 wrote to memory of 2248 884 2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe 30 PID 884 wrote to memory of 2248 884 2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2872 2248 server.exe 31 PID 2248 wrote to memory of 2872 2248 server.exe 31 PID 2248 wrote to memory of 2872 2248 server.exe 31 PID 2248 wrote to memory of 2872 2248 server.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f1b5739d51a5814da909446f22e9f3f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a0862202c47af53cf361f0c0869b9dd4
SHA1caa5f99d4e2906bab3e30389ce9c190079feb938
SHA2562d6d130382c071a47637529ab26b671a8a746e9fa8b9ab6bf9055df5d4008644
SHA512f4031a5927c17e0b1b49f58aeec47b98439bf686aef0906fff8408d0f1c0caf12a4f9ba3929eda5343c62da70f0b3d8e830b10398ce79e0f543d664f86ad4aa5