Analysis
-
max time kernel
123s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 07:49
Behavioral task
behavioral1
Sample
5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe
-
Size
342KB
-
MD5
5b0bbfb06bcceff60cc07ac6ebcb1ec5
-
SHA1
5d05cb1a4249393de101f41b57be6ba05eaa8c3f
-
SHA256
8a369f07f54c6209f48fb13028b0d9639f7024b75bba1d256dcb23e6e27aa505
-
SHA512
8d78fcdb7039db95ef39d38163d0fc8908673ea72df1765e1819a4d9f2020f436378d76fc6690f1efa292335222cb82f07be1610a53df3457218ff77c380d892
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lLIHBU0t8ST:EHLUMuiv9RgfSjAzRtyV0tl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1952 server.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe 1988 5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1988-0-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral1/memory/1988-14-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1988-14-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1952 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1952 1988 5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe 30 PID 1988 wrote to memory of 1952 1988 5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe 30 PID 1988 wrote to memory of 1952 1988 5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe 30 PID 1988 wrote to memory of 1952 1988 5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe 30 PID 1952 wrote to memory of 1228 1952 server.exe 21 PID 1952 wrote to memory of 1228 1952 server.exe 21 PID 1952 wrote to memory of 1228 1952 server.exe 21 PID 1952 wrote to memory of 1228 1952 server.exe 21 PID 1952 wrote to memory of 1228 1952 server.exe 21 PID 1952 wrote to memory of 1228 1952 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b0bbfb06bcceff60cc07ac6ebcb1ec5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD55b6d8bab1a985efc291db70337a71203
SHA1dd7b6d9980c6337b1f6279fefeda5658950ccb17
SHA2564b23d1d95f83b98421889bf5d8831c33dad09853000168c4308d2b03b0c6ed07
SHA512d2521d1a1179431d9b6e8095a7463952d7204b70325827a94c09196f8389a7fd3f0571c976e2be6fe12b6b1bf98ffadee1cc5b80fa7d4103c87e192da020f682