Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 11:10
Behavioral task
behavioral1
Sample
38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe
-
Size
13KB
-
MD5
38df3b8dc7d816da6efb42a7939075c3
-
SHA1
b9dded5e0173512368b4fc5f8fd3d1d3c1052b42
-
SHA256
029a514f04dcc0a8101f620057c4c0bb38a894ac95af5ecb902ff5f80fdf2615
-
SHA512
2d9a388601b528d4d37d01e9c885cafc9d8c44d761438ad1f9678b46977122aba112450f61108d664ae600b5a0a2dd141863a45f4428332f69bb5f88d04522f0
-
SSDEEP
384:m0ZnH+9//AZTSzbX8MFNYNVctnmYLDye:mced/k+b8MGctnr
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 3272 qensngk.exe -
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x00080000000234d5-4.dat upx behavioral2/memory/4456-8-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3272-10-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\qensng.dll 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe File created C:\Windows\SysWOW64\qensngk.exe 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qensngk.exe 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3272 4456 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe 85 PID 4456 wrote to memory of 3272 4456 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe 85 PID 4456 wrote to memory of 3272 4456 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe 85 PID 4456 wrote to memory of 3784 4456 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe 87 PID 4456 wrote to memory of 3784 4456 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe 87 PID 4456 wrote to memory of 3784 4456 38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\qensngk.exeC:\Windows\system32\qensngk.exe t!2⤵
- Executes dropped EXE
PID:3272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe.bat2⤵PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5c7441634e0a1adda6bcf385e6d8dc6a1
SHA1d6d6237971c41a2ade2bfd4fd8a251a9dfb0e459
SHA256f36cef5eb55c9ea532bbdc9600c853dd7727202ceb3d3e6d273dc7ef8b922f07
SHA51233a4f046087b70b1941cca445c48de7a55986a77acbf7a22ec67a9c97cd61d429326117a83d172dc0c2c272b3dd9faa0d29f8f5734363a39911b0297c61e4d86
-
Filesize
13KB
MD538df3b8dc7d816da6efb42a7939075c3
SHA1b9dded5e0173512368b4fc5f8fd3d1d3c1052b42
SHA256029a514f04dcc0a8101f620057c4c0bb38a894ac95af5ecb902ff5f80fdf2615
SHA5122d9a388601b528d4d37d01e9c885cafc9d8c44d761438ad1f9678b46977122aba112450f61108d664ae600b5a0a2dd141863a45f4428332f69bb5f88d04522f0