Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe
-
Size
92KB
-
MD5
4548b3cbbcecaa19b950838f5b9e09c4
-
SHA1
0b791fc0c613d2429315de70ed17fc350344e934
-
SHA256
829be7612f9461881032644ec250ee07cbee2f7766e43f12e0f8ef82b0e08d00
-
SHA512
c78fc45a4eb6a9319ed2f2a6682a7b7249f5ead377c26d4d61dd32f2a387ce29bd9322668c106f82e52a91792ba75002df39c57381299812ac55fd254d7b141d
-
SSDEEP
1536:ABJ8SC6/jYTFHVsk4Q3M9qmBbTzZ/3x47GurwoL45H0H4PNbTGl03SIKl7L1ipu:ABJUsjYB4PqkXF3y7trwoLI8YNbTGW2H
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2088 set thread context of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2892 2088 4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4548b3cbbcecaa19b950838f5b9e09c4_JaffaCakes118.exe"2⤵PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799B
MD5d840f2aa33b638da3f95e77b774d8bc2
SHA1850d47a60e2753f24afb2dcba6c17a7b2f39e6bf
SHA256e08bf7e408b430442348df72fb4d79fc068f098f836f60951c0e0864a4325386
SHA512a6c444eb00592fcbdd4159d25ff30652f7b6b2e162c76c13a07b3a3728c1d132d9b7ecc033798403212282d68b87dc3e89edaaf7a6bbcafcee0cfc0609693836