Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 11:01
Behavioral task
behavioral1
Sample
301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe
-
Size
36KB
-
MD5
301b8d4d63c022e0c2c6fae49ec0dd42
-
SHA1
6fd6708b08956986f24be4c75c00a324b0085586
-
SHA256
a1cd875002d46ac54c4cf63b5ea61f47f2f2d3408496eecba8a3261a54744914
-
SHA512
52a4da4772524e86e3b41d6fbd92aeae1519cf42683e4f8e6f1f56a46773158cafa6e6757299bbca772d1789d70fec931a6b177beef34a1be5b2ba4a421ea71b
-
SSDEEP
768:LwprPyljCsyJQQJ3WRLUxoqeq7gifHTVrAfsXJfUo4ryzwq:crCUJQQJ3WRLUyqeqkwgs5fqyz
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\swwai.sys 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\swwai.sys 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4272-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4272-10-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\KEz.dll 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\KEz.dll 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe File created C:\Windows\SysWOW64\QRu7wb.bat 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1548 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4272 wrote to memory of 2140 4272 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe 83 PID 4272 wrote to memory of 2140 4272 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe 83 PID 4272 wrote to memory of 2140 4272 301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe 83 PID 2140 wrote to memory of 1548 2140 cmd.exe 86 PID 2140 wrote to memory of 1548 2140 cmd.exe 86 PID 2140 wrote to memory of 1548 2140 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\301b8d4d63c022e0c2c6fae49ec0dd42_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\QRu7wb.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
PID:1548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249B
MD5b08429a154618ea305a27df8c230e724
SHA1ebdefc6f82abf640a6044ef6a26c61acd6b72a7f
SHA2565997fe1a7b99594e134a4e703ae92a363ebd6a9914ac953c6f29f42a6bcc9e85
SHA5127c6e0524d951d8fc5d62caefa87fe10528b75a75f824533e9adb36239bc50030787bb40ebb705ceef8e82a243e34a033c49a86a4d13e16539acbdea111050e24