Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe
-
Size
117KB
-
MD5
48e08db0f49c00478a6cddb4ae61f84b
-
SHA1
b9c6ca1250b0546fac9c1042fcbaeee3237b0ea5
-
SHA256
96d24375779ac2d3a945a9e11594866227ac64035ab994f6278d5d5a72ac84f0
-
SHA512
143dff5aad2a6142b095e44c565f752913e81ec42186304430eeefff9481c1e3ab77c05cc5d169002b209ce96fe776913933fd5f9262f7e280a9c4216bac0664
-
SSDEEP
3072:ikmWrVxUxpHrFToXF1PHDmQjpQcOc1Y6Cyux:wWZW0XFZDxY6Zi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2656 2740 WerFault.exe 30 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2736 48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2740 2736 48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2740 2736 48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2740 2736 48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2740 2736 48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2656 2740 2.exe 31 PID 2740 wrote to memory of 2656 2740 2.exe 31 PID 2740 wrote to memory of 2656 2740 2.exe 31 PID 2740 wrote to memory of 2656 2740 2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48e08db0f49c00478a6cddb4ae61f84b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 363⤵
- Program crash
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5c7b3866b2545e3eb23e0831372fa7c14
SHA125c6faec5a8111d08afeee82af42bae43015f0b1
SHA256c88ae81ded6b6d0a63d71a89de5f1f0a9d228bb59dde69c92ec32fdc04fc8a13
SHA512a96ec2db731409ac97e4782253f630ebc2b1debf042d2aee517478d706c0944462a3a25c33d6033f3ea3d54f5db87f30e77b56165593ce0af9f8a5dac6ea8eb3