Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe
-
Size
4KB
-
MD5
38b00c0c337a2839dd9f03181f3222a7
-
SHA1
e7dac4679ff69e7269dea58b5c909e3a73d3fb47
-
SHA256
579966ee8692b4c4743aa35306253cc318c43088702395c695bc691c167cd00f
-
SHA512
4d2d062d8e800485110e9601d5d57ccde18aecb67869a3eff68fe1da4559c86aefd614603a7ebfe40e6f75a2c0092906cc25b96dafaa6d21d215ec2fc414bce9
-
SSDEEP
24:nbB4nHFXBmQ/Ux0xq3ckoBCPUtNQ/mCL1Fq0GV0GsZVPQ/m8Tm6DKuhV1l:nN4nOk00/3NQ/mF0GVkxQ/m5KKuhp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2456 HELLO.EXE 2076 hello world.exe -
Loads dropped DLL 4 IoCs
pid Process 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2456 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2456 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2456 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2456 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2076 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 31 PID 1512 wrote to memory of 2076 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 31 PID 1512 wrote to memory of 2076 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 31 PID 1512 wrote to memory of 2076 1512 38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38b00c0c337a2839dd9f03181f3222a7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\HELLO.EXE"C:\Users\Admin\AppData\Local\Temp\HELLO.EXE"2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\hello world.exe"C:\Users\Admin\AppData\Local\Temp\hello world.exe"2⤵
- Executes dropped EXE
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542674f041a9b0264d0a6c771191de3d0
SHA1ed41b98e07545eac410da96512720d9f2d9c25ca
SHA256002d353d8a185b7042cc722a0cd154840eebd1e589832179e91065ba16d9d755
SHA51269546e68b8b0bef8bbae2d182fb7741b638bd2cd47636978b2e154d50a21dae17a38362f29875ab2221d2967c620078f0e976fa189082fcbcd7343919df1f41d
-
Filesize
1KB
MD5cd517295184b3539309cfedff45d7373
SHA1d4b3ac1f92e7dac32720de613570bfcead5996d6
SHA2561fa07d026c79a7bd75bedcbc6c89789f0563729705a02ee04018530815a1b41f
SHA5129174d101fc644fb7adfb8d89f12581246f579242fb27f00f3c9b1ff5618ab73a92331731a92c41d51eeee1ac9e31e8139bc75dbfb99f983bb7ceba28d831d149