Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe
-
Size
159KB
-
MD5
3792ea0c4304264d831f8ef11501bca2
-
SHA1
915250ff7eda9597825dd3c42c568d86bbfa1b81
-
SHA256
993911e2a1a5d1591e97e2dab567b51f73fba8512fc15f2cb0afdc8e00a3243e
-
SHA512
c7a91489d7ce698ee65b7a944b4ead8e08ba6ff74e406b153560734a911212de4b4deeb02f01db8e5b32b68409b382d3340caf2795ef5a2fca36e73fb4656773
-
SSDEEP
3072:z8eV9Od/zvPHbpZqeKko/V7260wTBfaPA888888888888W88888888888M:z8emd/b7jiywTBH888888888888W888H
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\DSC1221.jpg 3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe File created C:\WINDOWS\WReg.d 3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 1580 WerFault.exe 29 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 788 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2768 1580 3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe 33 PID 1580 wrote to memory of 2768 1580 3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe 33 PID 1580 wrote to memory of 2768 1580 3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe 33 PID 1580 wrote to memory of 2768 1580 3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3792ea0c4304264d831f8ef11501bca2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 8362⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:788