Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 13:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe
-
Size
324KB
-
MD5
34d6210de096688e9a178ed8e814a3b2
-
SHA1
5f62b041f29565fa0fc88640055c5b6075d444f3
-
SHA256
754f95253cb20bce90718f52942eb0caf87c2733d6b509fd511e75edb1c4c332
-
SHA512
46e0694ed703d0f82811f610d496ff6e84abfde801caa40c7ca69b0891f0e34b147af0cdb72046a2ec70e41b04b3a5bebe858a8356cc32b2e97b555a907b4843
-
SSDEEP
6144:l8pyQF/55zAzlUTC75Q7ZKYpku2Cp1PwKE2bmF/xyErNL+AeIGaMyaQmbH:K3/55zAJUTuGKU55E2iCQmj
Score
8/10
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\adbits.dll" 34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\adbits.dll 34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\adbits.dll 34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4632 4112 34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe 86 PID 4112 wrote to memory of 4632 4112 34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe 86 PID 4112 wrote to memory of 4632 4112 34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\34d6210de096688e9a178ed8e814a3b2_JaffaCakes118.exe"2⤵PID:4632
-