Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe
-
Size
400KB
-
MD5
312392511f6c01861cd85cf3eb90f812
-
SHA1
1502b4ba78ec4588d10911e50e5baf3eb31159d6
-
SHA256
d833d24217b3f112d800c04d9a05376b86ca14dc6a523a1ad801e239895b931a
-
SHA512
651fa31ab96332d59e97070193a4f3f744f7be0b505f6a4a55b7929635c810e746ed1c1db726cff7ebaaf4b31a50b6570f4e1378261ccbb3d9229d1a16f38743
-
SSDEEP
6144:Jg7t2ZRXbSj5+NfkKusNayVRbVRNJBXZl0JO7CNumvP6cRFEmcl31xOUzxs3Pthy:JgIRXbW+NE+V52sM6MxAxOIxs31h
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2548 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 pfqapo.exe -
Loads dropped DLL 3 IoCs
pid Process 2548 cmd.exe 2548 cmd.exe 3012 pfqapo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2108 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2344 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe 3012 pfqapo.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2548 2100 312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2548 2100 312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2548 2100 312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2548 2100 312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2108 2548 cmd.exe 33 PID 2548 wrote to memory of 2108 2548 cmd.exe 33 PID 2548 wrote to memory of 2108 2548 cmd.exe 33 PID 2548 wrote to memory of 2108 2548 cmd.exe 33 PID 2548 wrote to memory of 2344 2548 cmd.exe 35 PID 2548 wrote to memory of 2344 2548 cmd.exe 35 PID 2548 wrote to memory of 2344 2548 cmd.exe 35 PID 2548 wrote to memory of 2344 2548 cmd.exe 35 PID 2548 wrote to memory of 3012 2548 cmd.exe 36 PID 2548 wrote to memory of 3012 2548 cmd.exe 36 PID 2548 wrote to memory of 3012 2548 cmd.exe 36 PID 2548 wrote to memory of 3012 2548 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2100 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\312392511f6c01861cd85cf3eb90f812_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\pfqapo.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 21003⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2344
-
-
C:\Users\Admin\AppData\Local\pfqapo.exeC:\Users\Admin\AppData\Local\pfqapo.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5312392511f6c01861cd85cf3eb90f812
SHA11502b4ba78ec4588d10911e50e5baf3eb31159d6
SHA256d833d24217b3f112d800c04d9a05376b86ca14dc6a523a1ad801e239895b931a
SHA512651fa31ab96332d59e97070193a4f3f744f7be0b505f6a4a55b7929635c810e746ed1c1db726cff7ebaaf4b31a50b6570f4e1378261ccbb3d9229d1a16f38743