Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe
-
Size
449KB
-
MD5
4770c42355f88d7b260d8963c4157104
-
SHA1
fb1bed1683a63ff2d30cd0faba73966c134931d3
-
SHA256
508d4e70ea48476ef268ce20686ea96b1cc9aef429811ba13f603c07edf38047
-
SHA512
f59ea5ac2336c4a4a3f010189dd3b6cabc9b8425ed01be44a532b748033cb7872bc05706a4bde1ffcffd5f3719459c641e7cfaaf142743c9c574987d01078227
-
SSDEEP
12288:UaS006EYS/m/KQUWrAuqIfTwwEYOW22oPDig1NsX6:BEY0my9YAHOw1YzMDRa6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5052 Explore.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe File created C:\Windows\SysWOW64\Explore.exe 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Explore.exe 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Explore.exe Explore.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3040 wrote to memory of 5052 3040 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 83 PID 3040 wrote to memory of 5052 3040 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 83 PID 3040 wrote to memory of 5052 3040 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 83 PID 3040 wrote to memory of 1144 3040 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 85 PID 3040 wrote to memory of 1144 3040 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 85 PID 3040 wrote to memory of 1144 3040 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\Explore.exeC:\Windows\system32\Explore.exe -Service2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵PID:1144
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5519ecb6f76238d711ebc96487e3b55e9
SHA1949584d9b7c7dbb801977771a6043c5e4dfa1e33
SHA25689942f8eff18867a78aaa106c9a4a62fecee6765ff45cfe26244f7e47df51ce0
SHA512e8e910b8acdc75c51b2b12b0f0c59441cd05b341655e7b81a9cdddc37f42dc4329d8c402d6618685e5f0051005eff04e117febd51f8e9309ad1930a95af02f6b
-
Filesize
449KB
MD54770c42355f88d7b260d8963c4157104
SHA1fb1bed1683a63ff2d30cd0faba73966c134931d3
SHA256508d4e70ea48476ef268ce20686ea96b1cc9aef429811ba13f603c07edf38047
SHA512f59ea5ac2336c4a4a3f010189dd3b6cabc9b8425ed01be44a532b748033cb7872bc05706a4bde1ffcffd5f3719459c641e7cfaaf142743c9c574987d01078227