Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe
-
Size
195KB
-
MD5
5e5677f445e632845166c551434bdfbb
-
SHA1
72913924c72f7c4e5fecd63a045f268d3ea31aae
-
SHA256
4dbabfd2f7b0b29e9c53a9af04ac4e58d6545f1e504b1ccf3cc9251b1faff7c8
-
SHA512
9090d0b767533d09f38eb9e0465d797dff5db88689b56017d849db49638ac9b3f5058791ebccfcac07e3340327d36a671238c440c1c3d4d07ded5f15b4bcba0a
-
SSDEEP
6144:2zG8nriOnW/rGgGCY9DOwyYqY5P02iMK5:O1DYrDY9eYr02lK5
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe 2016 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 server.exe 2200 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2200 2016 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe 31 PID 2016 wrote to memory of 2200 2016 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe 31 PID 2016 wrote to memory of 2200 2016 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe 31 PID 2016 wrote to memory of 2200 2016 5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe 31 PID 2200 wrote to memory of 1196 2200 server.exe 21 PID 2200 wrote to memory of 1196 2200 server.exe 21 PID 2200 wrote to memory of 1196 2200 server.exe 21 PID 2200 wrote to memory of 1196 2200 server.exe 21 PID 2200 wrote to memory of 1196 2200 server.exe 21 PID 2200 wrote to memory of 1196 2200 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD53f5b738dfeb30e63c7e33e7bf30c89fc
SHA1cc0627b4287e9ed01a0be29d525554759a55e154
SHA256e809fb386ed9ef7e16f324df2050d1c78df7223524999ce67e75269bf4409637
SHA512a667b01b0c4f04d4eee2556e620428ff318d6e15849d7d8117a9ef1fc50b8e31594efee7c484903071e5164b32e3f1ee8f2a4212245fecdd7caddb19c0cddb7a