Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
3fafa17d4957940e4ae2ef8750cb6171
-
SHA1
15ad35d749d754852215c3975a9b4d41d015bf93
-
SHA256
3a0b6ecf2f055095c6761848dd1b0022bc4149748f8fb860099cc6e148cfca28
-
SHA512
07ea477e834be2f70ee2e6ee3a0ceb3e467f9a1b1201815310aef8673e5fbfc71074c17648c498a3bf30719c53d248edc62ade2ac5d352d6fe076205201a8905
-
SSDEEP
98304:JERruFwMcEWgZ7UxLuaKFt4sLR2StVpaSmMXup5RGvKzd9/wkw:JEoFLctRhu/L1V058vKp9xw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4836 is-K4PFL.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2952 wrote to memory of 4836 2952 3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe 84 PID 2952 wrote to memory of 4836 2952 3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe 84 PID 2952 wrote to memory of 4836 2952 3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\is-34K4P.tmp\is-K4PFL.tmp"C:\Users\Admin\AppData\Local\Temp\is-34K4P.tmp\is-K4PFL.tmp" /SL4 $5029E C:\Users\Admin\AppData\Local\Temp\3fafa17d4957940e4ae2ef8750cb6171_JaffaCakes118.exe 3633321 506882⤵
- Executes dropped EXE
PID:4836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD5d499fa2314a6f1f88dff6399592dd8c2
SHA151d5553397b3bb940bbe4d2b21a928cd289d845a
SHA2562f7794373a39f9805d2a849400925640e2d8c399c4208f0f1fc046f362c5f061
SHA512338f0f94d6aae3bbd948066167b3896b9b14ba7578b1013766cd533bb183f078e848564f47ef7486c400a55f8e192fd2fd57b269a547f0d71d6f7f8f425321ac