Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe
-
Size
15KB
-
MD5
478addbe3c33f4064ac691e7310a9eff
-
SHA1
70535c06a0702aebac4fd43ea0c5b830e7115957
-
SHA256
f92e0f6057ea8b58848c0d2cf98ee3115605087ac0f87ec4dbca0bea5225fbc3
-
SHA512
7291b56b3fe0f51b071789a4a52343b56943b1700b162cd42921a1c0a78d4b0be446076e5d4fdae4f530a73cb414f06d09428a4b2686fc2081d97d6718b34467
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhJEHe:hDXWipuE+K3/SSHgxWe
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3012 DEME88B.exe 2180 DEM3D8D.exe 2056 DEM932B.exe 2784 DEME86C.exe 1272 DEM3E58.exe 2396 DEM9389.exe -
Loads dropped DLL 6 IoCs
pid Process 2304 478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe 3012 DEME88B.exe 2180 DEM3D8D.exe 2056 DEM932B.exe 2784 DEME86C.exe 1272 DEM3E58.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3012 2304 478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe 32 PID 2304 wrote to memory of 3012 2304 478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe 32 PID 2304 wrote to memory of 3012 2304 478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe 32 PID 2304 wrote to memory of 3012 2304 478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe 32 PID 3012 wrote to memory of 2180 3012 DEME88B.exe 34 PID 3012 wrote to memory of 2180 3012 DEME88B.exe 34 PID 3012 wrote to memory of 2180 3012 DEME88B.exe 34 PID 3012 wrote to memory of 2180 3012 DEME88B.exe 34 PID 2180 wrote to memory of 2056 2180 DEM3D8D.exe 36 PID 2180 wrote to memory of 2056 2180 DEM3D8D.exe 36 PID 2180 wrote to memory of 2056 2180 DEM3D8D.exe 36 PID 2180 wrote to memory of 2056 2180 DEM3D8D.exe 36 PID 2056 wrote to memory of 2784 2056 DEM932B.exe 38 PID 2056 wrote to memory of 2784 2056 DEM932B.exe 38 PID 2056 wrote to memory of 2784 2056 DEM932B.exe 38 PID 2056 wrote to memory of 2784 2056 DEM932B.exe 38 PID 2784 wrote to memory of 1272 2784 DEME86C.exe 40 PID 2784 wrote to memory of 1272 2784 DEME86C.exe 40 PID 2784 wrote to memory of 1272 2784 DEME86C.exe 40 PID 2784 wrote to memory of 1272 2784 DEME86C.exe 40 PID 1272 wrote to memory of 2396 1272 DEM3E58.exe 42 PID 1272 wrote to memory of 2396 1272 DEM3E58.exe 42 PID 1272 wrote to memory of 2396 1272 DEM3E58.exe 42 PID 1272 wrote to memory of 2396 1272 DEM3E58.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\478addbe3c33f4064ac691e7310a9eff_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\DEME88B.exe"C:\Users\Admin\AppData\Local\Temp\DEME88B.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\DEM3D8D.exe"C:\Users\Admin\AppData\Local\Temp\DEM3D8D.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\DEM932B.exe"C:\Users\Admin\AppData\Local\Temp\DEM932B.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\DEME86C.exe"C:\Users\Admin\AppData\Local\Temp\DEME86C.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\DEM3E58.exe"C:\Users\Admin\AppData\Local\Temp\DEM3E58.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\DEM9389.exe"C:\Users\Admin\AppData\Local\Temp\DEM9389.exe"7⤵
- Executes dropped EXE
PID:2396
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD50e03e4c1b3f76860737743e43e513d56
SHA1f261119ca183149de3760119b8b9522bc7e3c736
SHA25623b72cc423da3dd26cf8f8321bd988ec89a3d9d5ef2b84696b93c3185ebbf763
SHA512bd8c31d69e7c2babf704398e5ac10dd8c5d1478f02b6eb7f3ec210bd4e00fc24fa31eae1cef1f7bff690b78144ff3a3414166db60c4c656625290704a1641602
-
Filesize
15KB
MD5583a1787d0a59a31b9f1c34d5ab11b6e
SHA155302fa93d24ac648f86f1369f70f05e7c2040ac
SHA25604313217f0460529f7d4d607f3a8ca681432a28784f7fe4cb8d29e9a590347e5
SHA5125ac5bc41346e5e51e35d6da66da906c97dca50f041c17c557f9cb0967136f20e0a7721453a55491bfe2d7879d86b58eac53f0d41fcc023cca745460b6413be0c
-
Filesize
15KB
MD56582fd18cc0b99854b628d0c0f2816ab
SHA1b3f46ceac40fc809b5f4216590cc54eae2d878d0
SHA2561d1a98aac7ba75f626a2167862b0fbd29a82e05f274f7709e81ae284bb691987
SHA5129074115225279e5ba62ea38e0fb48ff6547cb6956570e41ff87f0cd5eb8a090468bd72a3af6c6b56c4c2a5648ce70ce0736cdadd3fa8f4a0a06b881f1da95d81
-
Filesize
15KB
MD55bba8c3721bfb2297e72f7e97c576095
SHA1d538f236abb3b007b011690bcc403e975cdadfdd
SHA2562141c95be4e857c8e31aca74a7842dcf7c69c4843c2e923802b4fd5aa6df991a
SHA51229f61b38926c5b9ec9f615e268d5eb9e742489495c2d80c88f2decf0ec31f6f96fdfe9fb090b808a1138a861cb4ca3ca3f6662fa2b92c4e7947a126a4d5db302
-
Filesize
15KB
MD5e43a5a85b6152d5e4b67f0d97e236090
SHA1ec8ecbb2d8c5dde5faa13226e5afd066293f016a
SHA256377d356304c0ad5d2aefc287bafbdf5407f547cd912f9eb1a2a3a813f577de67
SHA512324c566e530422eebe81a06331405702f1236a784db5893e86a4c7db43927e935e0ad61ca9d2400b3c09cc2e4c1a5ad95d3c46e06fcfe33c3e43549c948480db
-
Filesize
15KB
MD508b3ce46b3ebf353d44363a90fee025a
SHA13bdbc55c64992602914d674a6aedabcd437b42fc
SHA256808a250a5315307d2f76b258b91aec174d04c94d652a4ee9628ccf8750a7f878
SHA51224d13cea5ee131d11e589f3371894bd027bf5c154b9f938fe2affd7f9f53b40a14e0224642a669ffafd092562cf6b39169db32f908110bf20dcec69d26eac086