Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe
-
Size
117KB
-
MD5
620d5812adab1b259afa3c7cfc1a9420
-
SHA1
c85301aac0836da13ec02a12c6ffca7b054d606a
-
SHA256
5929cdd4adcb86bee392fb40d9d818ad8bb6ca8eb95f20a3fb811f241d882590
-
SHA512
2dec3d54b7680961d5378155d0b393b234646372908a8b668985022b1b76b60fc2a1644e6ed79375beec6999c1ce22ca0fda2204d70e78b45f5af1f2ecf81dd0
-
SSDEEP
3072:ZFmI1FY0GrjCsBBdbdmS8gOY0NF4AKVJtrN43ZR:HRaCWdbduNVKVJz2z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2784 2624 WerFault.exe 30 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2708 620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2624 2708 620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2624 2708 620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2624 2708 620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2624 2708 620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2784 2624 2.exe 31 PID 2624 wrote to memory of 2784 2624 2.exe 31 PID 2624 wrote to memory of 2784 2624 2.exe 31 PID 2624 wrote to memory of 2784 2624 2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\620d5812adab1b259afa3c7cfc1a9420_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 363⤵
- Program crash
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5a185d566bdc851a6cbfddb35fca6b992
SHA1a9dd9927669549069188d11e9348e2111d1137ac
SHA256d4b9fd07b5cb22b9e244f2ea1ba7df2e0b865ec5e0b0dc86ed595ca03deffd5c
SHA51241d0ab2af60b6ed96f4269abe34689a896e3f72cb84da81a260a7046f427166d7f0d9b1ed8704006fcf838ed484b7787fde8b379bef6ec01a8dc74d3eff53785