Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe
-
Size
118KB
-
MD5
4ac786fbeeafd110bbe9e91a49ab1829
-
SHA1
104bffef6c0013ccbe2ac14f9052fc3f85d5828f
-
SHA256
c1ff4bd80fb33de6e1a905a68b3df6f9eb47811458eb1fef655f97365a938afa
-
SHA512
1be0b743cae0dbcd0c5c8f2d96fe61eaea8e4675d7c2b3e58e0af6bcfbaec4b3440c4a2941e155ebc6d5f48aed0cb6ba3b85e95f3cce37f87dd0fc2d9216846d
-
SSDEEP
3072:P2lBxmX5PhML1laDKagOvchrXyY1OCQD4rQcgz:iYP2L1Qqf9CH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1880 mg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\mg.exe 4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 600 4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 600 wrote to memory of 1880 600 4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe 30 PID 600 wrote to memory of 1880 600 4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe 30 PID 600 wrote to memory of 1880 600 4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe 30 PID 600 wrote to memory of 1880 600 4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ac786fbeeafd110bbe9e91a49ab1829_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\mg.exe"C:\Windows\mg.exe"2⤵
- Executes dropped EXE
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5683fffa5a57bd97f6020a17fddfa063e
SHA1d2105d9f625748ac6be7e4daf244b9f0e4b216fb
SHA25630763202719ec7e8fd7760f1b2e962d2886e725f99f324fbf6f308b403bf3742
SHA5126f352e37e0bfeedf885ec2b9fdb780b01823b4f02de8b77628944ad2b114e8dff1fe9633e08aac862331434011dea7eb024ef29e1a4acdbc14078bfa0f1049c0