Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 13:42
Behavioral task
behavioral1
Sample
4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe
-
Size
11KB
-
MD5
4610f61f6f542b457ee4aa391bdb5ae9
-
SHA1
e271a1ca50fe04554ef9ab982f5e3918d9490fb9
-
SHA256
7c08754a90a54e8ff5f33c02d83a5de7807d99fe26c66941c6fe6e73a18cadca
-
SHA512
e9ebdc5370c36d10abcb548ba067ead06f09bea470c9e7a6669e4e9166046891fcc5da9cd587b0d2db2b1b42d1f22de58fb28e83027636392368db3ca9882edb
-
SSDEEP
192:NErlncuFLrflfLN8EMOGk0XhhT09GP1sHOEF/NKI2mvwl3LQpc5:NErln5dWEjGk0XGsEpcZnx
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2552 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 cmonosk.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2648-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0008000000016c96-3.dat upx behavioral1/memory/2144-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2648-13-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cmonos.dll 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe File created C:\Windows\SysWOW64\cmonosk.exe 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cmonosk.exe 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2144 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2144 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2144 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2144 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2552 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2552 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2552 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2552 2648 4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmonosk.exeC:\Windows\system32\cmonosk.exe ˜‰2⤵
- Executes dropped EXE
PID:2144
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118.exe.bat2⤵
- Deletes itself
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5838f3d86348fdf9a396d077c63e7848a
SHA13345f7c055d1fef29c6864ce7109e2e6972f5d90
SHA256384a7252d44827c652fa34db7bbcb15325dc774a0dbacb1e680474bf3717b75c
SHA512e54d74b08f60af316f63fc9af942ca7355586cb89c144c9af0216eaf79fae1e522727d3b777564d6b65f673e8326a85a619dfe71261ada94e05ef0a630b63344
-
Filesize
11KB
MD54610f61f6f542b457ee4aa391bdb5ae9
SHA1e271a1ca50fe04554ef9ab982f5e3918d9490fb9
SHA2567c08754a90a54e8ff5f33c02d83a5de7807d99fe26c66941c6fe6e73a18cadca
SHA512e9ebdc5370c36d10abcb548ba067ead06f09bea470c9e7a6669e4e9166046891fcc5da9cd587b0d2db2b1b42d1f22de58fb28e83027636392368db3ca9882edb