Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe
-
Size
88KB
-
MD5
44636e6e9b81704c92d0a8cea0a77b8e
-
SHA1
ade55c26b2b2d0d5666a978a7ed1a4b6d3a0ae49
-
SHA256
5d1c429a007814e75ea8e22367a894b5cc9203df3d1a5be3a915798f2396389c
-
SHA512
5b95bfbc36f488a73f2ae0293c79954ace08a6d0d64df4f20f83fc51c59217d92cc65c4173c172d3fbb29d6bb4659e4954d01eb300f18b3d91e79f202a578ef5
-
SSDEEP
768:xg3+1mTlezZEatuHqLPkhEryY5USTMSuHcj19lmVWUE2q7NRbCxX5HoL3/QZZHwq:xu+1meZmhtYhUKLPyQH2xEAAwT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2900 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2900 2876 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2900 2876 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2900 2876 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2900 2876 44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\44636e6e9b81704c92d0a8cea0a77b8e_JaffaCakes118.exe" >> NUL2⤵
- Deletes itself
PID:2900
-