Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 01:01
Behavioral task
behavioral1
Sample
59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe
-
Size
314KB
-
MD5
59d3ed4caced565b0e1041581350cbd5
-
SHA1
f5b8728aa766ee090d0cb97b7e7fbe26664d3b27
-
SHA256
bf0980310e53af2ee700281132d015f3491675f4a0c9d7e1d3147def3d05e3af
-
SHA512
54b284ab7b91b89e5ec708d8796fa51cb1eb4237c28df254216bdbd0805a8613450b61e984728d777bc03703ed938d27081ad25b65ca244ba71f91d574000e9f
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lpI4wz9JjL:EHLUMuiv9RgfSjAzRtyOJjL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 396 server.exe -
resource yara_rule behavioral2/memory/932-0-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/932-11-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/932-11-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 396 server.exe 396 server.exe 396 server.exe 396 server.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 932 wrote to memory of 396 932 59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe 84 PID 932 wrote to memory of 396 932 59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe 84 PID 932 wrote to memory of 396 932 59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe 84 PID 396 wrote to memory of 3436 396 server.exe 55 PID 396 wrote to memory of 3436 396 server.exe 55 PID 396 wrote to memory of 3436 396 server.exe 55 PID 396 wrote to memory of 3436 396 server.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59d3ed4caced565b0e1041581350cbd5_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5bcb728d1834da27726012fff2b8ca38e
SHA114a0e415507f701392f773734970fe8c38536fe4
SHA256fc0a745e2da9ff8fe3672fb98f894af040e2382d6bdef6334e482324c64b0455
SHA5128841588f5aaa8cc3a762707068b88ca25653b2715fa426813086b33afb52e3c70addef40cb97b02a6b09408e0d2d1a77b367e5c99a88a81edcf8071f2691bfb5