Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe
-
Size
566KB
-
MD5
5f3af2b7dc7239ae71ffb918e68926bc
-
SHA1
2f8d2b4e78678dcdb53bd0c0de90dcd52d5b665a
-
SHA256
1f991e6d754aa99415dab6c3700ccf674dab7c9106ff8a737a056f2a34bece66
-
SHA512
8e89da572aa910812848c3e1ce21eacc5a9c91a8891eb78abed5b56894d89318d741b7cec834ccbba6e8c66e0b6ef1fb86f0b8f7e6d1fc76d5c9f0fc207a2adb
-
SSDEEP
12288:xq37+gtJKn+y/w7rEJUryEnF3Z4mxxRDf8pJ/AN8kXUvX2V3uO0A/0:w+n/w73uaQmXRDf8pJ4NfH3uO05
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4080 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4080 set thread context of 2236 4080 svchost.exe 89 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\systom32\svchost.exe 5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe File opened for modification C:\Windows\systom32\svchost.exe 5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2464 2236 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4176 wrote to memory of 4784 4176 5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe 88 PID 4176 wrote to memory of 4784 4176 5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe 88 PID 4176 wrote to memory of 4784 4176 5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe 88 PID 4080 wrote to memory of 2236 4080 svchost.exe 89 PID 4080 wrote to memory of 2236 4080 svchost.exe 89 PID 4080 wrote to memory of 2236 4080 svchost.exe 89 PID 4080 wrote to memory of 2236 4080 svchost.exe 89 PID 4080 wrote to memory of 2236 4080 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f3af2b7dc7239ae71ffb918e68926bc_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\7145.bat2⤵PID:4784
-
-
C:\Windows\systom32\svchost.exeC:\Windows\systom32\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe" 123452⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 123⤵
- Program crash
PID:2464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2236 -ip 22361⤵PID:2092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD52b7b3a3ff4c2337ebbe350ce50b4439b
SHA11b177bf2899687cb4a9601c7c4f81e57af635cb0
SHA256ba666b7794186beb3d6d30c49f1ebe0124ff34eb1850d6082b02ecfec752046e
SHA5123d28bbbd493bf37d539c77080f21eb823d7adce34a6100a9231171f5250b379a678caced147f26d1b2cac9c398734970268c9a42b8e42eb06c95e254fd3eb832
-
Filesize
566KB
MD55f3af2b7dc7239ae71ffb918e68926bc
SHA12f8d2b4e78678dcdb53bd0c0de90dcd52d5b665a
SHA2561f991e6d754aa99415dab6c3700ccf674dab7c9106ff8a737a056f2a34bece66
SHA5128e89da572aa910812848c3e1ce21eacc5a9c91a8891eb78abed5b56894d89318d741b7cec834ccbba6e8c66e0b6ef1fb86f0b8f7e6d1fc76d5c9f0fc207a2adb