Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe
-
Size
653KB
-
MD5
65ee8d252127a1222bbba889ce0e47e8
-
SHA1
d0a415de772206da8c4c9b8abd86420b92446094
-
SHA256
360937ebd64a55d6af261f7142b1494537534fdab4624eb39fc13f92898fa90a
-
SHA512
375c4a69424e1027502d6899c7d64f51165419a399a2f6ea13753d0e4548793adcef541530840b7d1f78d256e3e55e63c3e701816ded7a3871f92c2ed03003c8
-
SSDEEP
12288:oRFj6EhxNTSHMfTFHh2CoQKqfyigeiJ8UcxkVzrUqzEPoYxfkKbzP:LEhPSHMdhXoQKqfyf8jx6r1z1akkP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 396 dcf.exe -
resource yara_rule behavioral2/memory/2340-17-0x0000000000400000-0x00000000004CA000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2340-17-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 396 dcf.exe 396 dcf.exe 396 dcf.exe 396 dcf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2340 wrote to memory of 396 2340 65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe 83 PID 2340 wrote to memory of 396 2340 65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe 83 PID 2340 wrote to memory of 396 2340 65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe 83 PID 396 wrote to memory of 3456 396 dcf.exe 56 PID 396 wrote to memory of 3456 396 dcf.exe 56 PID 396 wrote to memory of 3456 396 dcf.exe 56 PID 396 wrote to memory of 3456 396 dcf.exe 56 PID 396 wrote to memory of 3456 396 dcf.exe 56 PID 396 wrote to memory of 3456 396 dcf.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65ee8d252127a1222bbba889ce0e47e8_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\dcf.exeC:\Users\Admin\AppData\Local\Temp/dcf.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD59fd745e5becdc74e00624c3974d6e076
SHA16e0def97f937095694735fce11590be7a4a19fde
SHA256e929b00f66e9b0bdfc01f693ad5cbe5d2e3cb24158dc0a815dd604f1e4c2b8a8
SHA512d64421b10aab2fbad15a769a73cd577f27dd05f074776dc9283c673354312357bcb59d99eab02dff4e31962be1f05dd815ea9533b766970800dcdf5c9630e8a6