Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe
-
Size
147KB
-
MD5
66b99ffe1c60aad510b24c0a2e39d43e
-
SHA1
27716d003ffc0f94043f6419091b5c87951b2b73
-
SHA256
bef7ea4833e21db94ddeb0366cfb65be3b4a909e322239483b17abf789b54f5f
-
SHA512
8910aaea784a9fc34c756b39ccd1f18874c8146d8167e377bfa1235d296fda9c0dca6e3bf24643f2a5ef89d801dbdea2b415ceb3f78a69d0c923fbdbe216d2c4
-
SSDEEP
3072:2CMiqJl3v1S4AsvdhxBz8bNk/AKItB/pL/s9hlSLUFWzs:2CMzfM4vxBIO+XpDnUUzs
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2152 ksygpla.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\arpkhqa.dll ksygpla.exe File created C:\PROGRA~3\Mozilla\ksygpla.exe 66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
PID:220
-
C:\PROGRA~3\Mozilla\ksygpla.exeC:\PROGRA~3\Mozilla\ksygpla.exe -vwpcxle1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5376da184d52208250bc4efcdc460708f
SHA169c3482e915a7c33da75b9943cf6530dc7df44a8
SHA256185d0ea827aab37a807a5b806b8f8d8d20f343c72b2c4adffd92891e80b47fd4
SHA512ab01aa8844a91c7686477e34ac46e9773e059499e3e98b8c121a09014c0b053877ebeaaec266ad508de0635b58a79e738636a55043e117074bbf57d26aff337b