Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe
-
Size
107KB
-
MD5
32a9a93e9106fe90b97a2b90e90f7ed3
-
SHA1
bf6130f31985392bb2724991bd4d86d0f999a2ab
-
SHA256
6cb4f7acbb76f0403a82b6325ee4996397b6f7f69c8be3544f1c535b58b93227
-
SHA512
5fc85b898618ef4601a80f7028259ee08df29021d4b2add85d07792f0a6a6884e19cd6c70e3cc8b180c4b25ddcd606acd7ad614ed6cbb330b5f42de0e31b07db
-
SSDEEP
1536:lnR5wgjPoY50I1HUMF971bSom3rVPFDTHXVIS4pJTQSVKry41eYsI/:loUPnP1H594rRhmPQVryced2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2888 kodsf.exe -
Loads dropped DLL 3 IoCs
pid Process 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aplib.dll 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2888 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2888 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2888 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2888 2700 32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\kodsf.exe"C:\Users\Admin\AppData\Local\Temp\kodsf.exe"2⤵
- Executes dropped EXE
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5ffba5287555f5eb2668eba0f4f797bff
SHA164df61d9b3edc6bb4b4c86ce82f14f0ed8dd8b11
SHA2561c22347713b5cd166a84df98457e560bcb6309c19863639d7c464b538d115061
SHA512a11f6f2da7ed10882f231371211e90b1d184228174aa81afae35fcc1ef87858880309356eba49b0b0a10e3b4af37d88038ea340837a7e3794cea147ce3666744
-
Filesize
12KB
MD535d174edd3c0bcfa9a32dce19e1abeb9
SHA1c22638e64f8a5f34809811a2c286ae2f115028f8
SHA25634194aa58d0eb70b513ea6a876a4f35ba6cc2f19c4fb6d408dd05580dcc74b04
SHA512f807df3655e6dd0cea2412ae82aa7b3babe3862fa9eee5d38673ee30b26a528b9618e1a25d3a58ef1ff14be36a666fabd32968b5f4dc481539d2372b526c1ead