Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe
-
Size
156KB
-
MD5
65e86eb593cd24f71e33a625edd43537
-
SHA1
03374072405bedc4e8d92523b5b24dc341dd9ff3
-
SHA256
4d2c1a8b392f7e955854c467030089da5127d04ecb759fadc22f025af0442627
-
SHA512
9ba1b9cf364d3834f5e31a470df91920c87fc43e83f59b552378aa2a7d0541c54a6004c6b64a823f484a1f61b763b32b85e34a9ffbe446d71f147a1d1a26d95e
-
SSDEEP
3072:JGu9BlfzWIbXWm+w0Js5iWR4GTShhUYld/TAxu8FlCYQL0uz05SEX:J/0uog4GTMon+Y40uQV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3860 5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3860 2580 65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe 85 PID 2580 wrote to memory of 3860 2580 65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe 85 PID 2580 wrote to memory of 3860 2580 65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65e86eb593cd24f71e33a625edd43537_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe2⤵
- Executes dropped EXE
PID:3860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD57bac79ae65e02d0a2e850b0df1786a3f
SHA1591283469214d121ea1d371287ad00ce8e04d584
SHA2563b465c3efe4c8d390ecdec06543cc07be2c64deb833daeaf834a71e7ceb33699
SHA512df0f3228b35e83b4a168cc8662cc5bae75402f8d3d3e3c9284c5b78d0d2216a2eae947a2048f50a3f074467bde29e34d9eed06b3f895715027762bb7b2d06f8e