Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
4526370aba26120ba5a4730000329f96_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4526370aba26120ba5a4730000329f96_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4526370aba26120ba5a4730000329f96_JaffaCakes118.exe
-
Size
413KB
-
MD5
4526370aba26120ba5a4730000329f96
-
SHA1
528574cf1ad604cd28c8e6f59e39092b9a37d07e
-
SHA256
db0c6cb435a3b6e8b7850601450fca9a528d735a0cece4f680f69462539a14a4
-
SHA512
6e0ea44d3feaa258ba36be991d7c0c24ed8ba38041271d3547e0eff600a7ad31797f3d1932b0b7fae383ef36bd7bf57cfcdd75b00608e137bb0e1bff590e5f69
-
SSDEEP
6144:7MGg9eBsQsNwK6JUwi9/gO9Q7d+0tyGf84Coan+bSwXkREUiRa0ETB/srEwX:8eBsQRJUwE/gE++yv1bBRUiRRETYEw
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Security Accounts Manager Server\Parameters\ServiceDll = "C:\\Windows\\system32\\System64.dll" 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 308 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64.dll 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe File created C:\Windows\SysWOW64\KMe.bat 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe File created C:\Windows\SysWOW64\System64.exe 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\System64.exe 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 308 3056 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe 32 PID 3056 wrote to memory of 308 3056 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe 32 PID 3056 wrote to memory of 308 3056 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe 32 PID 3056 wrote to memory of 308 3056 4526370aba26120ba5a4730000329f96_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4526370aba26120ba5a4730000329f96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4526370aba26120ba5a4730000329f96_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\KMe.bat2⤵
- Deletes itself
PID:308
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netservice1⤵
- Loads dropped DLL
PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100B
MD567e7efb30ba903ae232fdac9abd38851
SHA166e76b62bbf2e2fc629364de9882e7aec1265ed1
SHA2560858d784332e40d0716f3ef3f4f64560257fde0bf417f6f4f5a0d72e005923d6
SHA512efe4859cb9c97c27696daa9abddbc0828e841aa2ad6f074b902914250ad070f328887f483ce56890169f927805fa520d1071362debc42c49f758774cc6ecc71c
-
Filesize
311KB
MD5d883c2434700bd99001c512fe34ddc00
SHA18ba15fdce19806bf24e73f2c89e2f94e1d3e6ce3
SHA25618e29d1b0c8c4a52b7950005ea8e6a4bde8f6ce4e1a3384f26b374961331ac09
SHA5125b7b77db4d872b2004af0c36bf69a1ac1ba78b5aca90a38d63278bbc9df64f6a4d9d59fc3eac8997dc327789e60fd8a63af520bf22157cda9414241233b04b93
-
Filesize
413KB
MD54526370aba26120ba5a4730000329f96
SHA1528574cf1ad604cd28c8e6f59e39092b9a37d07e
SHA256db0c6cb435a3b6e8b7850601450fca9a528d735a0cece4f680f69462539a14a4
SHA5126e0ea44d3feaa258ba36be991d7c0c24ed8ba38041271d3547e0eff600a7ad31797f3d1932b0b7fae383ef36bd7bf57cfcdd75b00608e137bb0e1bff590e5f69