Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe
-
Size
40KB
-
MD5
3188344854588c001b9fb1801cd02cf5
-
SHA1
fca48d90b1ad49e2369301dc56073820658bf5d5
-
SHA256
5bf54fffc947fc74089d9db59dba47fe3c6f54915e7aaf224deeb7d96e2fbfce
-
SHA512
f1b0c6130cae86b33de66acd0b312b52ec56eb4b7ad1c103e9fd953fe453ddd0d72f81bcb6f0393005aa4b6a1f67ae2cec59fb4f9b0fd983449942e80c414cd9
-
SSDEEP
768:F2T4jwgTOl/tFr60FIgbrcAztf9Jrd0NV+RQmgQ0N2UxZuf:IT40UOlzr7lMAztf7QmgQAyf
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1048 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Mxeliso = "rundll32.exe \"C:\\Windows\\Gsafecahalevetec.dll\",e" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Gsafecahalevetec.dll 3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1048 4900 3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe 80 PID 4900 wrote to memory of 1048 4900 3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe 80 PID 4900 wrote to memory of 1048 4900 3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\Gsafecahalevetec.dll",e2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5337eea684ddef97cc944500c81fbeece
SHA152bf627adbbc3d27095c108e7ea2e0e60c7ecb2b
SHA2567ddee08a62b0782ddcf0ae83c7602b4c1f60e2b2c7e7e2da5ae9e4250f96ef3e
SHA512c25955d030d37be4f2ec0632dc8525fd2bd9dde1f694494a6616623d669164fef2204a7109ad3f3875c5e09be01b236de5d3b199a1736f9768046fe0701e380e