Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe
-
Size
172KB
-
MD5
4a3d1e4cd1bfafd8c80c34b086ae3bd8
-
SHA1
a41ec0164c5a303810a55ebab945cab42d7f66a5
-
SHA256
13fa71f61af67881cb964b29f18c4ca20d546f14e58516c5f16f47cabf4031ec
-
SHA512
ddb7c38ea418185ef589797b7c02f72f5e62a6ab99992dc94874fe9d2d152dbd25c519d2329c8ffd4ea5e19d3a6256ed70dec01d5456eb2add3dedbc9449a617
-
SSDEEP
3072:EQRXeWbBeTxN7kf8DexRxhrZ7jy+bTuJrlgIwGxnrYsqTQSgAQxP3kx:j5re9NVexvhrZ7j3TuJZw2FqTQSgAQxP
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\2599D58.tmp javaw.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 javaw.exe -
Loads dropped DLL 12 IoCs
pid Process 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\2599D58.tmp javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2696 1188 WerFault.exe 30 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1188 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1188 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1188 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1188 2540 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe 30 PID 1188 wrote to memory of 2696 1188 javaw.exe 31 PID 1188 wrote to memory of 2696 1188 javaw.exe 31 PID 1188 wrote to memory of 2696 1188 javaw.exe 31 PID 1188 wrote to memory of 2696 1188 javaw.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\javaw.exe"C:\Users\Admin\AppData\Local\Temp\javaw.exe"2⤵
- Boot or Logon Autostart Execution: Print Processors
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 2283⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD56277de3ffd967b8efd1819c9bf401109
SHA108e63817eb11890f9f2c350b1e0e59d50714e858
SHA256ee0335f8dadccea0c78f1188bf156359a464b8fc010560551b28653e0bc6f5f6
SHA512108aebea9a9a665c5cda4eddd966cc3961e0c38f472756c46e3082904061532ea91b34a84a70246589f2f0cccc187b10095476dad6784e7e106b907f9eb0b6fe