Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe
-
Size
211KB
-
MD5
61f56dadd689057da43bc40fa1be4ad4
-
SHA1
cadef36ff8f4263962e1d3de13289dcefda9a0b6
-
SHA256
b960fd4380591fd46119f777fd4b61628eea367b187298a74815b8d0a0327e14
-
SHA512
e8ef08df7760733c9013f836a01628977da888a88508d975e0b5206397ce39f5d76195829b6bbdafc45c633ab3cb5cd4a33ae42782456fdc64cda3c20236b06e
-
SSDEEP
6144:YqHSyBeXzrx2YO1Ecj9pkpjkag+Uk0wkR:YqHZBgXSaUkpjkav
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3508 service.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\service.exe 61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\service.exe 61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\appget.ini 61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe File created C:\WINDOWS\appgets.ini service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2268 wrote to memory of 772 2268 61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe 84 PID 2268 wrote to memory of 772 2268 61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe 84 PID 2268 wrote to memory of 772 2268 61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe 84 PID 772 wrote to memory of 3508 772 cmd.exe 86 PID 772 wrote to memory of 3508 772 cmd.exe 86 PID 772 wrote to memory of 3508 772 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61f56dadd689057da43bc40fa1be4ad4_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\WINDOWS\system32\service.exe2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\WINDOWS\SysWOW64\service.exeC:\WINDOWS\system32\service.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD561f56dadd689057da43bc40fa1be4ad4
SHA1cadef36ff8f4263962e1d3de13289dcefda9a0b6
SHA256b960fd4380591fd46119f777fd4b61628eea367b187298a74815b8d0a0327e14
SHA512e8ef08df7760733c9013f836a01628977da888a88508d975e0b5206397ce39f5d76195829b6bbdafc45c633ab3cb5cd4a33ae42782456fdc64cda3c20236b06e