Overview
overview
7Static
static
349cb8966ef...18.exe
windows7-x64
749cb8966ef...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/PlayMe.exe
windows7-x64
3$TEMP/PlayMe.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMP/PlayMe.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/PlayMe.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
General
-
Target
49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe
-
Size
148KB
-
MD5
49cb8966eff77f732b40d852cb79c380
-
SHA1
5665057e803ccacfa8ca3facda766759b6cc9d12
-
SHA256
24e851ab58fa7b4fa63262424f07afe86208c587d77762266a010daf5c40d9f4
-
SHA512
fd33de81282014c865c453c793a789bcc05ac130f09e447544d78f987a988ffbf2df9ca566eb588881ebf4178ea8f18313c53137addb5aea7392dc4db5fc9146
-
SSDEEP
3072:SPg729btBovpvw6RkMcXwcTaufYsy/nKTitKlWCDETIU:wI2F4hvwQJUfAsInqlNA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 PlayMe.exe -
Loads dropped DLL 8 IoCs
pid Process 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 3052 PlayMe.exe 3052 PlayMe.exe 3052 PlayMe.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2900 3052 WerFault.exe 30 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3052 PlayMe.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3052 2708 49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31 PID 3052 wrote to memory of 2900 3052 PlayMe.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49cb8966eff77f732b40d852cb79c380_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\PlayMe.exeC:\Users\Admin\AppData\Local\Temp\PlayMe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 3243⤵
- Loads dropped DLL
- Program crash
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5790a8d36746004f13bb7f7978c43a530
SHA12b55413f9732ae9d6945f8421348ba8bfb4aeedb
SHA256d22557c3d0defdf899f6f8162d108975723640e883ad186aceb11631d62ca294
SHA512698ee549344deeb7033afb9806c84af85a401d406f742310317154af67ba9951863c9708e056625c0e73359edacdc924fbc18b38545609f1ce922a74bbe0405c