Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 18:26
Behavioral task
behavioral1
Sample
644b2432138080f8999caf663b388fa9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
644b2432138080f8999caf663b388fa9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
644b2432138080f8999caf663b388fa9_JaffaCakes118.exe
-
Size
253KB
-
MD5
644b2432138080f8999caf663b388fa9
-
SHA1
eb1a22a9c2b5e522d8031e75032edee97be85b94
-
SHA256
add66fae3979bf25c4da00c984f6f4efdd31ad7e46ed88be70593dfe364364fb
-
SHA512
4b591053023557b577ce427338a1d15bebb9de1c4321fc8aea023e79430ce4503b71c931e575392eb678ce33625924430f7e275462bd95e4a0ca71fb32ddb524
-
SSDEEP
6144:LhrPmDJFIMWa5gNlabWRF1UWsI72UT//OZQxevht:NLKIMWaqqKRF18CTLo/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2100-0-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-3-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-4-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-5-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-7-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-8-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-9-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-10-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-11-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/2100-15-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2100 644b2432138080f8999caf663b388fa9_JaffaCakes118.exe 2100 644b2432138080f8999caf663b388fa9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1136 2100 644b2432138080f8999caf663b388fa9_JaffaCakes118.exe 98 PID 2100 wrote to memory of 1136 2100 644b2432138080f8999caf663b388fa9_JaffaCakes118.exe 98 PID 2100 wrote to memory of 1136 2100 644b2432138080f8999caf663b388fa9_JaffaCakes118.exe 98 PID 1136 wrote to memory of 2236 1136 cmd.exe 100 PID 1136 wrote to memory of 2236 1136 cmd.exe 100 PID 1136 wrote to memory of 2236 1136 cmd.exe 100 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2236 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\644b2432138080f8999caf663b388fa9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\644b2432138080f8999caf663b388fa9_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\deleteself.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\644b2432138080f8999caf663b388fa9_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD52c8407ad52acbff0537da078bfd00c14
SHA19d531bd833a55288c860831a2deefa23111e747b
SHA25623fea3b52432733f62cf98fa4c6c116b1fb2e8710a1b0de39ea4de60a6431832
SHA5121470fbb0c459209940ceed15bf7a312544e72c99c55f59eb14bfebd0612109814084ada4a2ca10b3ffc705d57c81626dfa4758e5475e4c4d0fad4b082869ed96