Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe
-
Size
127KB
-
MD5
4c80781ecc472105c238b7b992a4113a
-
SHA1
90a801b6e45b9580993156888fbcb1cd17b41ce0
-
SHA256
1d8bb46328d4a631196242c07941028c9bee0ae9236653ffc3d61cba3f209aea
-
SHA512
ea3940c95e8c9a94e5e73ba039e35c90610596bf1bc1937e6d23ce3e699e690fddc012b03acae94034377bbecb4d97c78cbdb73ee93ac5fc13e83af1ab8a052b
-
SSDEEP
3072:F/ZhdAfXWcjqwcsjmidQAFA4gax3LHELFzfIohj:FhhdAsh6JJA4gM3LEL7j
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2700 CryptedFile.exe 2816 CryptedFile.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 CryptedFile.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 2816 2700 CryptedFile.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 CryptedFile.exe 2816 CryptedFile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 CryptedFile.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2700 2064 4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe 29 PID 2064 wrote to memory of 2700 2064 4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe 29 PID 2064 wrote to memory of 2700 2064 4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe 29 PID 2064 wrote to memory of 2700 2064 4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe 29 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2700 wrote to memory of 2816 2700 CryptedFile.exe 31 PID 2816 wrote to memory of 1216 2816 CryptedFile.exe 20 PID 2816 wrote to memory of 1216 2816 CryptedFile.exe 20 PID 2816 wrote to memory of 1216 2816 CryptedFile.exe 20 PID 2816 wrote to memory of 1216 2816 CryptedFile.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c80781ecc472105c238b7b992a4113a_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\CryptedFile.exe"C:\Users\Admin\AppData\Local\Temp\CryptedFile.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\CryptedFile.exeC:\Users\Admin\AppData\Local\Temp\CryptedFile.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD57a1426bf71611f6382262e0b2cff7439
SHA17f7ef3e5f2c42d816e5cca797eabd3910749e803
SHA256046d3a0d423236bfeb79559d77d51ffa65088d5ca03e28c2dd8e80ade49ad157
SHA5121bc03c96148a3736808bd1de454a06f976f60e5b557c6d40ac5be79b3378db1ef9f5610b9f8629568bccc1174fcdff2f91084fd988d995b6fe23d091b4ee1936