Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
5c48416137b42e268fa414ca3e5223f0
-
SHA1
b4479ec4a7c02bff1f9f1431edb38cebc1ac1092
-
SHA256
545973de41aaeec424949975a6477ec58259be8c5d4b41ab57a9f5184cd367db
-
SHA512
c17b53a35d6f802ae5044b966567177dd8c9dde9b3e64656b90280071cc06228f75fd77e96caad023049070a07948e9983664b2113ae3a8c84bcdb8069e34f6d
-
SSDEEP
98304:1eMwdPjC59yJ7dECQ4J1rRf9n96EXKoIrDuL1H8d:rmPjSUf9n97XKCa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2264 7za.exe 848 Setup.exe -
Loads dropped DLL 3 IoCs
pid Process 2500 cmd.exe 2500 cmd.exe 2500 cmd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019504-36.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 848 Setup.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2728 2808 5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2728 wrote to memory of 2500 2728 WScript.exe 31 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 2264 2500 cmd.exe 33 PID 2500 wrote to memory of 848 2500 cmd.exe 34 PID 2500 wrote to memory of 848 2500 cmd.exe 34 PID 2500 wrote to memory of 848 2500 cmd.exe 34 PID 2500 wrote to memory of 848 2500 cmd.exe 34 PID 2500 wrote to memory of 848 2500 cmd.exe 34 PID 2500 wrote to memory of 848 2500 cmd.exe 34 PID 2500 wrote to memory of 848 2500 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c48416137b42e268fa414ca3e5223f0_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lanceur.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Extract.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\7za.exe.\7za.exe e .\WebPlayerTV.7z -pjesuisadmin -y4⤵
- Executes dropped EXE
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe.\Setup.exe4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD561992d5995f0020c48f1cf541e044024
SHA1c4d7069d450b774807735b804edcf76317b6f2b4
SHA256bb7e2d019add8bebe2cafd5fee397c438a05d3296fe505755a59599c15bbf92d
SHA5120dafb6b1fd289fb7d5ca954ceeb1c1794cb43f331114e3be8f8ad795c33a003c1962fe254f299e33ecc08e590acec332034881ab8d975f921dc00c76fcd6e728
-
Filesize
21KB
MD5523c100a6fec6eb73c10a705ba1a232c
SHA1c6d6246e3a419033e405f057f38dcfec57eae628
SHA25673347a81d34cee029012392a51fdc62e3dd53eb1a1d0f42b62d0f5080058cd68
SHA512c4c7b0ea9aeff0dab543bda19862a078abce61fcaa1cf3a6c815dd52af34f31cdfc5042525ef02a908a9ebdb7c734c04a068c9593eaabdcee34d9aef38a2ece9
-
Filesize
87B
MD59495ff73014b8a17bd4798911ad097fa
SHA171b6db4d7e576cf8b1cbf93079397bc0c1ce46b2
SHA2560a59275adf474e7164e14a7e622ecb93f3a1477958e6e1e0de6d7ae2c6913a33
SHA51255062bb9381ac302367aeb43492613762434da730663891f577e050fcbc0993eaf19e96154adf4d669cb9587d8eef2a7ec96cb02b366db5d5c58b1eefe64ecd3
-
Filesize
115B
MD567eb1322395d41dddc9045b4eef2309d
SHA1b85b2332b9fd4ac03aec49a9291e90e8b96547a5
SHA25656ddc657309aeab74ca42cf466deac992da8a0054830340ba839ffdf1d242be4
SHA512de37b1358f639f6647e6ae99b6719a0ddf5e9b8f9e8ea33b6284ecac3d33650e9257a63697dcd5d79ee5ed2790ece0b3aca3332719f678ca89f3d4562b00603d
-
Filesize
74KB
MD5a4d795c34867efbba61d84a09156d772
SHA1672c675792527a3876fa18b1971630965d1a90b6
SHA2561011c278c03a696d8ca3e7e3e039a6b184b740a57585f4af5bf62ff8d428701a
SHA5129fa8cbeed832d3ba238e5247a1704cb586b275ac5f4e3dd97115c04a34709b59cbc5611e74558cd9467d12b332c831fbf88fb71bccf0786de5fc35204bd7abd1
-
Filesize
3.8MB
MD5ffb52edc44a84c9efa827f047acb0254
SHA159e5648b24a64649d9b6c78f73e0ab7ce37d162c
SHA2564dfb07b98493aee46a2078d8514ef77551a663df47dd00f6d9169a0355816dbe
SHA5123f0079504666eef4bb04ce28649929b8a1af894537b80ba6936b1785d3cc9ee5fd1fc9886d44689715926cb2ab057b355f003148ec228749f8b4b3b0c6e39026
-
Filesize
356B
MD588120f8c8f57321a91fa1c00b898cba2
SHA1073af01c61707c810b0336f2d9f37dec3cc175ef
SHA2566b20e9a25af4c092558f463786f630e27638f1cd44791f6b886c797548ad9adc
SHA512d5b7955cf9c4b3c1ee0588b7c0453466c0e0b48d4793685ab8e7af3a290b7e66e66f285a3c46ef3762b2a0fa1745abb5f5cdff0895dc47cb2b072e1590dae5a4
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
Filesize
754KB
MD5a9590ed40a7f7430e9502f98ebc86239
SHA145b2942570896d664f1b530d9713c1c667dd95af
SHA256dd025f6e55464a1f9bfbc28994c406c8b7948624ac4fed52edf62f0a857c45e3
SHA512d031e1516b8f5467d11cb6ff7cc1ee3301c3476aa8e5b957ba553c65457a49f5fd67e87fe2af10b5c83b03e9f40bfdb143a24da2d78419df24cc8973ab447c5e