Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe
-
Size
620KB
-
MD5
4ce183df03d9564fe99bfc50793398ce
-
SHA1
4d2085b5ffab0b8bfbe7bb3726f96f90f1a832de
-
SHA256
913084a5e4351ee9f1297d5eb1535b56e9e5b427b7da564977897aa4647f5955
-
SHA512
a5363a1dcacf854c0f5ef5392d5b4e76466efaeafe9a13c5ecdd39ed4d9357941ab36255649822b92b9ef710cefd9ccf4c67c018a6f9690f8b32433123cd68d7
-
SSDEEP
12288:q858R0hBq99K7CXEBKF2F3Z4mxx+OxTnf2Cc6FqVHqq4:r20Go7/MF2QmXFV7c6EVHqq4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4188 Server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\_Server.exe Server.exe File created C:\Windows\SysWOW64\_Server.exe Server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4188 set thread context of 3504 4188 Server.exe 87 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3988 4188 WerFault.exe 86 3972 3504 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4188 4416 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4188 4416 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4188 4416 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe 86 PID 4188 wrote to memory of 3504 4188 Server.exe 87 PID 4188 wrote to memory of 3504 4188 Server.exe 87 PID 4188 wrote to memory of 3504 4188 Server.exe 87 PID 4188 wrote to memory of 3504 4188 Server.exe 87 PID 4188 wrote to memory of 3504 4188 Server.exe 87 PID 4188 wrote to memory of 2936 4188 Server.exe 88 PID 4188 wrote to memory of 2936 4188 Server.exe 88 PID 4416 wrote to memory of 1868 4416 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe 94 PID 4416 wrote to memory of 1868 4416 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe 94 PID 4416 wrote to memory of 1868 4416 4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ce183df03d9564fe99bfc50793398ce_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 124⤵
- Program crash
PID:3972
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7003⤵
- Program crash
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3504 -ip 35041⤵PID:920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4188 -ip 41881⤵PID:116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5bdaadb76fd55f35a34abf5c2b61395e2
SHA1d180680ad04c9c5a28410dd9b6b9f6309b304475
SHA256306d9ae60efd826e7bc6516db6dd1f4231860531b830c3a2c800674e8c84758a
SHA512ba41ce60838a2cd4126643ebe4946ef2d0e86d151694dd33b413fdc48a3523a96d869599d54d3c9ca327609e2b375ac28b011bf203fa3f08ca7f1127f186f607
-
Filesize
620KB
MD54ce183df03d9564fe99bfc50793398ce
SHA14d2085b5ffab0b8bfbe7bb3726f96f90f1a832de
SHA256913084a5e4351ee9f1297d5eb1535b56e9e5b427b7da564977897aa4647f5955
SHA512a5363a1dcacf854c0f5ef5392d5b4e76466efaeafe9a13c5ecdd39ed4d9357941ab36255649822b92b9ef710cefd9ccf4c67c018a6f9690f8b32433123cd68d7