Analysis
-
max time kernel
96s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe
-
Size
599KB
-
MD5
340bb5ac4921b3b34d4766dd5f438dbb
-
SHA1
ae85163aa2cb24169b91ebd387639d6e57da32a7
-
SHA256
4b3a81a74c8b8e7edbd23bf261cb93295f65c8c5e194362fc5ffe56075512054
-
SHA512
31aee4304329204c83967e195985f19f089f69c93705b2954b4682616cc9e207b7db5157e4a2ae9bc873230f5f1e38a0b6115ea9168e5d69c6ddc05d280c5d3a
-
SSDEEP
12288:II/H0gA/39MRkSH1PetFEOJXfo6QfAQr0tN+VewbPAOeXO+WT:II/F6MmRDEgvMApn3s/uWT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4248 Remote.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1420 3160 WerFault.exe 80 1076 4248 WerFault.exe 89 4856 1092 WerFault.exe 92 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.cmd 340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4248 set thread context of 1092 4248 Remote.exe 92 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Remote\Remote.exe 340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Remote\Remote.exe 340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3160 wrote to memory of 1372 3160 340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe 87 PID 3160 wrote to memory of 1372 3160 340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe 87 PID 3160 wrote to memory of 1372 3160 340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe 87 PID 4248 wrote to memory of 1092 4248 Remote.exe 92 PID 4248 wrote to memory of 1092 4248 Remote.exe 92 PID 4248 wrote to memory of 1092 4248 Remote.exe 92 PID 4248 wrote to memory of 1092 4248 Remote.exe 92 PID 4248 wrote to memory of 1092 4248 Remote.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\340bb5ac4921b3b34d4766dd5f438dbb_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 6402⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.cmd2⤵PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3160 -ip 31601⤵PID:1488
-
C:\Program Files (x86)\Remote\Remote.exe"C:\Program Files (x86)\Remote\Remote.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6402⤵
- Program crash
PID:1076
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"2⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 123⤵
- Program crash
PID:4856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4248 -ip 42481⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1092 -ip 10921⤵PID:4424
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5340bb5ac4921b3b34d4766dd5f438dbb
SHA1ae85163aa2cb24169b91ebd387639d6e57da32a7
SHA2564b3a81a74c8b8e7edbd23bf261cb93295f65c8c5e194362fc5ffe56075512054
SHA51231aee4304329204c83967e195985f19f089f69c93705b2954b4682616cc9e207b7db5157e4a2ae9bc873230f5f1e38a0b6115ea9168e5d69c6ddc05d280c5d3a
-
Filesize
218B
MD56710e933f4d217984d2e681f58c44fed
SHA1272a4eb5691097f23605b64f416936b6ecba91cd
SHA25643e58b8991ebe83e2c38cbd69fe1544221a0691a8a19a364c457776e71242e5a
SHA5126a7a6f4b6e46cf885ccc41adb238178174c0d91a0b4a602966576d8ac666bfd1cfb11fc9074e11053e46f3b57a636e96b25a74ca277ec219ecf374f871583b30