Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
405665b87ea285e182004f016ab401fa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
405665b87ea285e182004f016ab401fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
405665b87ea285e182004f016ab401fa_JaffaCakes118.exe
-
Size
88KB
-
MD5
405665b87ea285e182004f016ab401fa
-
SHA1
8de4ed73a58d7df3f6680a8c93a76e3b04297903
-
SHA256
d10cebd566912f2c5fcfe5b30c9815182c63255f55a3527c9753f0905d8b976f
-
SHA512
17849dcc09f27698cc6236c785c9eaac90e662441c61d82e016935df97ce6aa2ac0ad3294f55286c035a92a8b52ebd104a2c4c0b7ec12add899ad06921f5a7d2
-
SSDEEP
1536:ErRcmlnSfIDNBlwp/Ux31k5tu0xyf/792TgQPGXPVZSCcvyqHtZjLAu+h9PV:ErRcmeIpBlw/w10tupf/792TPPOX4NJQ
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2848 atividx.exe 2516 atividx.exe 2272 atividx.exe 1644 atividx.exe 2600 atividx.exe 556 atividx.exe 604 atividx.exe 2988 atividx.exe 2072 atividx.exe 1712 atividx.exe -
Loads dropped DLL 20 IoCs
pid Process 2756 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe 2756 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe 2848 atividx.exe 2848 atividx.exe 2516 atividx.exe 2516 atividx.exe 2272 atividx.exe 2272 atividx.exe 1644 atividx.exe 1644 atividx.exe 2600 atividx.exe 2600 atividx.exe 556 atividx.exe 556 atividx.exe 604 atividx.exe 604 atividx.exe 2988 atividx.exe 2988 atividx.exe 2072 atividx.exe 2072 atividx.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\atividx.exe 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File opened for modification C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe File created C:\Windows\SysWOW64\atividx.exe atividx.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2848 2756 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2848 2756 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2848 2756 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2848 2756 405665b87ea285e182004f016ab401fa_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2516 2848 atividx.exe 31 PID 2848 wrote to memory of 2516 2848 atividx.exe 31 PID 2848 wrote to memory of 2516 2848 atividx.exe 31 PID 2848 wrote to memory of 2516 2848 atividx.exe 31 PID 2516 wrote to memory of 2272 2516 atividx.exe 32 PID 2516 wrote to memory of 2272 2516 atividx.exe 32 PID 2516 wrote to memory of 2272 2516 atividx.exe 32 PID 2516 wrote to memory of 2272 2516 atividx.exe 32 PID 2272 wrote to memory of 1644 2272 atividx.exe 33 PID 2272 wrote to memory of 1644 2272 atividx.exe 33 PID 2272 wrote to memory of 1644 2272 atividx.exe 33 PID 2272 wrote to memory of 1644 2272 atividx.exe 33 PID 1644 wrote to memory of 2600 1644 atividx.exe 34 PID 1644 wrote to memory of 2600 1644 atividx.exe 34 PID 1644 wrote to memory of 2600 1644 atividx.exe 34 PID 1644 wrote to memory of 2600 1644 atividx.exe 34 PID 2600 wrote to memory of 556 2600 atividx.exe 35 PID 2600 wrote to memory of 556 2600 atividx.exe 35 PID 2600 wrote to memory of 556 2600 atividx.exe 35 PID 2600 wrote to memory of 556 2600 atividx.exe 35 PID 556 wrote to memory of 604 556 atividx.exe 36 PID 556 wrote to memory of 604 556 atividx.exe 36 PID 556 wrote to memory of 604 556 atividx.exe 36 PID 556 wrote to memory of 604 556 atividx.exe 36 PID 604 wrote to memory of 2988 604 atividx.exe 37 PID 604 wrote to memory of 2988 604 atividx.exe 37 PID 604 wrote to memory of 2988 604 atividx.exe 37 PID 604 wrote to memory of 2988 604 atividx.exe 37 PID 2988 wrote to memory of 2072 2988 atividx.exe 38 PID 2988 wrote to memory of 2072 2988 atividx.exe 38 PID 2988 wrote to memory of 2072 2988 atividx.exe 38 PID 2988 wrote to memory of 2072 2988 atividx.exe 38 PID 2072 wrote to memory of 1712 2072 atividx.exe 39 PID 2072 wrote to memory of 1712 2072 atividx.exe 39 PID 2072 wrote to memory of 1712 2072 atividx.exe 39 PID 2072 wrote to memory of 1712 2072 atividx.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\405665b87ea285e182004f016ab401fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\405665b87ea285e182004f016ab401fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 476 "C:\Users\Admin\AppData\Local\Temp\405665b87ea285e182004f016ab401fa_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 544 "C:\Windows\SysWOW64\atividx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 528 "C:\Windows\SysWOW64\atividx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 532 "C:\Windows\SysWOW64\atividx.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 536 "C:\Windows\SysWOW64\atividx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 540 "C:\Windows\SysWOW64\atividx.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 548 "C:\Windows\SysWOW64\atividx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 552 "C:\Windows\SysWOW64\atividx.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 556 "C:\Windows\SysWOW64\atividx.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\atividx.exeC:\Windows\system32\atividx.exe 560 "C:\Windows\SysWOW64\atividx.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1712
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5405665b87ea285e182004f016ab401fa
SHA18de4ed73a58d7df3f6680a8c93a76e3b04297903
SHA256d10cebd566912f2c5fcfe5b30c9815182c63255f55a3527c9753f0905d8b976f
SHA51217849dcc09f27698cc6236c785c9eaac90e662441c61d82e016935df97ce6aa2ac0ad3294f55286c035a92a8b52ebd104a2c4c0b7ec12add899ad06921f5a7d2