Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 12:38
Behavioral task
behavioral1
Sample
41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe
-
Size
200KB
-
MD5
41b1a972205a513bad7d2968ad841452
-
SHA1
fcf05750508beccecb4804627ae061d0f1062da2
-
SHA256
d855def96303fe7aa3c65760d6583ad821ff75e38dcb3e880147132ef0ebefe5
-
SHA512
fb581c63dab1d0d580c6bb0723e51f7666139d7deb87fb35185f8ed30f2326f433ead435ae5c02e52d8e6ff195fefe03212c0618fe9f7e12dab76f162b7d7dec
-
SSDEEP
3072:z06hibes47Knd9KNx2gMRBvc457TkoWhZAybh4m5m:z06he3nnnMx2gcvx57YoWPr4mg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2832 a.exe 3020 1.exe -
Loads dropped DLL 2 IoCs
pid Process 2832 a.exe 2832 a.exe -
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2832-10-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2988-9-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/files/0x000a000000012118-11.dat upx behavioral1/memory/2832-23-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2832 2988 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2832 2988 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2832 2988 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2832 2988 41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe 31 PID 2832 wrote to memory of 3020 2832 a.exe 32 PID 2832 wrote to memory of 3020 2832 a.exe 32 PID 2832 wrote to memory of 3020 2832 a.exe 32 PID 2832 wrote to memory of 3020 2832 a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41b1a972205a513bad7d2968ad841452_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\a.exe"C:\a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Documents and Settings\1.exe"C:\Documents and Settings\1.exe"3⤵
- Executes dropped EXE
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ed15f2b4113204402c46a0e516165715
SHA1c034ec5fe281494f933ed6bb312b9e607b1f9ff1
SHA256a2ff51aed42c85af59e18d576095be46eb8b45e43ba97e70f86c4df99bc74deb
SHA512413efb2c3f562bea358a1e4f34e6366216ff8eac7aa5e8cb346265fb7db7a31fba897f6d743d90becca261f318980ac0822ca3b4adfb34f892ebcd08fce4311c
-
Filesize
96KB
MD557dc599041e7caa1903cb728c24bdecf
SHA185a96ce06c1ed514f854c26d5e9cae3d01d06c02
SHA25651c5917ddcaa159c4cad91a18f54d9bda8d8ca2072350d48e18c93c957229a7a
SHA51270f592561929dbcf31c23b0a6fc43ef5173193ef09b6f56ada800dfd547221e88cc72dbe58cb3a47b5a7a062ef52c0fb1663ba45ca2a9bc69717e533469e88e6