Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 01:26
Behavioral task
behavioral1
Sample
59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe
-
Size
25KB
-
MD5
59e683b3b3a74db9464adf4c0fc687fb
-
SHA1
313f459ed1ea49ea4fb158b2dfa4447013e7a076
-
SHA256
e10a86ddcee14d8bb0b849c589ed2559d8378ee3ef4bacf41276948f5a606bc1
-
SHA512
e287de0de66cdd6c809e6c45f43f48c30ab80b2c380c7d810f2433f739b9325347f45e6eecb6f54942b6176efe83d9630bd6d1f15f98a66072e1baa2d40e730a
-
SSDEEP
768:8UMljZ8lPdlQcH+7+ZPCYqCkol9Y8VpR1CT6:81tZ8lPdlQcH+7yCY5RX1CT6
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\pcidump.txt 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\pcidump.txt 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1624-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral1/memory/1624-24-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2904 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2904 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2904 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2904 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32 PID 1624 wrote to memory of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32 PID 1624 wrote to memory of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32 PID 1624 wrote to memory of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32 PID 1624 wrote to memory of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32 PID 1624 wrote to memory of 2652 1624 59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uuu.bat" "2⤵PID:2904
-
-
C:\Windows\SysWOW64\mspaint.exeC:\Users\Admin\AppData\Local\Temp\59e683b3b3a74db9464adf4c0fc687fb_JaffaCakes118.exe2⤵PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55B
MD53494943ded62289772eb4ffad9765057
SHA1e307f4458c4c96df28e2960b8a12f5f098729d77
SHA2566b4dd8956842f6cd4bb4ed52bd38ff63a81f1e1a0389927617437852cd109566
SHA512eb601e4a520d8b1d305064cc77132a890f8b8000fafa32c14c1413e6b26f49605f7ee327b8233cb7294b83bd605ebf17f3d8eb06b28df103714802fde22fa9ab
-
Filesize
14KB
MD56f8d7c787c11b2533f99c4a9e730bb99
SHA14ae84b8bc7a7e4440800e98194788a8bbf05beb9
SHA25626bfe5dc67ebf16c052daf1fb90bb3bfe5744364d8592f154639309ecf6a86b1
SHA512ae076b4f000c39d88d108d202365177266d87e1245d68ad325a588d3275526cc646979fc8fb8c2bb03bb5beed41926934dac4d0ccfc4d06c2030a72f3d164e57