Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe
-
Size
1014KB
-
MD5
42eba69ee31c68a8d54c0adb9cb68cc9
-
SHA1
7ff36e9b9868f70ee0123c143c7abd7f5f2c4879
-
SHA256
2c73410d1ca62f7da97b4b60d0f199cea7864f29c3ac5b5c4f34d00ed1320743
-
SHA512
0e3599e7a378fbcc0370a52cc3ea70e59f0538f439f1f58e58a6630075e84c9dc7261055b23db03f561e23db5b72b87557b5aad19881669c8d9ea523030026c7
-
SSDEEP
24576:EVikL0n4hGmJd6nggGFbChimErm4GuhBVrh4HZqlwtrgeZ:EV4n4Gmn6cFbChilGSyZms0eZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 INSB3EE.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2548 4324 42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe 86 PID 4324 wrote to memory of 2548 4324 42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe 86 PID 4324 wrote to memory of 2548 4324 42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\INSB3EE.tmpC:\Users\Admin\AppData\Local\Temp\INSB3EE.tmp /SL3 $6029E C:\Users\Admin\AppData\Local\Temp\42eba69ee31c68a8d54c0adb9cb68cc9_JaffaCakes118.exe 1029804 1033218 619522⤵
- Executes dropped EXE
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5ef80f42a048f92263f758f14b09fa30d
SHA1e250058636dee689d6a935d71c0f462e10457239
SHA256a44707ed7ababc6ca81355e9a6afe0e5095d01f1c72ef7b37681447036da518e
SHA512933b43e14cbb734ff48d9b0b06671f15e458633a4e4d52420dd2eda258fc477ae17183a5d83d47da78272d1d6c7f9ba547729cd846ebec5eaf9963b2fce605ed