Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe
-
Size
789KB
-
MD5
66cb5671bae31154dc6ffd5388e2156c
-
SHA1
589cdc4762b6ce02d568cce842849b1201d1a299
-
SHA256
13fd22e4d66a87760677683c59fbe23ad58326ac131bf5e4acdfd9a024772ef9
-
SHA512
7fd10c2e071f5eb719195211194b42e96b5e0740e1168fe0315db57ae9b121c6943e14840b219bd99b1d4f17cb956d295eaeaabd15448791513e35256230b17b
-
SSDEEP
24576:LWsqdJ5V+uYvbRtJRH/nsNHBSs7R7uoE9+72:LWsO5V+1bfj/sJhil9k2
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2116 pmp.exe 2900 HaxActual.exe 1096 Platipus.exe 2724 HaxActual.exe -
Loads dropped DLL 2 IoCs
pid Process 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 2724 2900 HaxActual.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2724 HaxActual.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe 2116 pmp.exe 2900 HaxActual.exe 1096 Platipus.exe 1096 Platipus.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2116 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2116 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2116 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2116 2984 66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2900 2116 pmp.exe 32 PID 2116 wrote to memory of 2900 2116 pmp.exe 32 PID 2116 wrote to memory of 2900 2116 pmp.exe 32 PID 2116 wrote to memory of 2900 2116 pmp.exe 32 PID 2116 wrote to memory of 1096 2116 pmp.exe 33 PID 2116 wrote to memory of 1096 2116 pmp.exe 33 PID 2116 wrote to memory of 1096 2116 pmp.exe 33 PID 2116 wrote to memory of 1096 2116 pmp.exe 33 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2900 wrote to memory of 2724 2900 HaxActual.exe 34 PID 2724 wrote to memory of 1232 2724 HaxActual.exe 21 PID 2724 wrote to memory of 1232 2724 HaxActual.exe 21 PID 2724 wrote to memory of 1232 2724 HaxActual.exe 21 PID 2724 wrote to memory of 1232 2724 HaxActual.exe 21 PID 2724 wrote to memory of 1232 2724 HaxActual.exe 21 PID 2724 wrote to memory of 1232 2724 HaxActual.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66cb5671bae31154dc6ffd5388e2156c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\pmp.exeC:\Users\Admin\AppData\Local\Temp\pmp.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\HaxActual.exe"C:\HaxActual.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\HaxActual.exeC:\\\\\\\\HaxActual.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724
-
-
-
C:\Platipus.exe"C:\Platipus.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5d33d2f17d15019e3c12429025c3430b7
SHA10a271371bb4dde7cba2ed7b73115462a75710980
SHA256c20e3faeb209a0d388473e306370afed4e529a00780802526820cd0c1c195095
SHA51234df60e37de2adf34739500f3c105e5470ca5c8aefacb27fbca1d1096c49f2c357ff26b002b00b71605bcced1dc7d7897c7378d5d6b8d663d8edca78df73ced9
-
Filesize
485KB
MD58fd97a81718cb12257c4c96c6a24970f
SHA16dd01865804403c6cf4e5d896162b394ae990d0c
SHA256fdf578b3a7aafbcbe4a7d9bbefdbc8b8c7bab154fb34374da3bc6903d436a15a
SHA51240fa9f33ff7e4145888710f6000e1baeae6d11e23d70ca38dab199f457e42348e4126814dd9246e67ba7d040b0dc2f156adc8f8149af270b1502feea37db70d7
-
Filesize
7KB
MD5efdec50c782d28cdb015812e6caf6035
SHA1caa166af9be38db41bb316656e7e1c224ce039bf
SHA2563647ef77964ae5751902df3366cbd92e0af32887c8dc0e55347e63c6b0d4bada
SHA512518794806f892263cb8cd858cef6c61358461255cc770a23bec0b63480890d2451c80f0ffc24a9622c891bc1841254a7f953ed858b2fc628dd9c7c27494203bb
-
Filesize
761KB
MD5ac05166174ea4189f960402a58b36a8e
SHA160caef871be873555201cefc8a74bfe64b33c2bc
SHA2569de0133006c4bf5f3eb5b2ce84b8a03ec74a4a8b19810f574fa6f0929ab066f1
SHA5124ef3ae83f46227a3b10e44e19aeee99149a75617e7ae6d66a7cc4c22391b736beac2e280395a4ed45dcf41fb069f285fb700195ab9c2c05a2fed3fd3a5ab13cd