Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
04fd00b5f5040fca407a16843c14a9b2
-
SHA1
ff17e184c4d8f9e602ccd81bdda1adb3ff954495
-
SHA256
47f56dae427763c9ebf94947545a71bce2dd272ba96e4cc6629389fc9b7e99fb
-
SHA512
6d6d23adca4c0a242183fcbf2988b51aa61326d4a3fb88630032d32654efa67c9fb84a0a10cff0082f9aaa9255974c65b0654d3525b3462d59e2817917529721
-
SSDEEP
49152:Qoa1taC070dF6/Kv1v8Nbp3CPJDToAt6HQ4wShR:Qoa1taC0Y6tBCT6w4fb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2164 5DBA.tmp -
Executes dropped EXE 1 IoCs
pid Process 2164 5DBA.tmp -
Loads dropped DLL 1 IoCs
pid Process 1528 04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2164 1528 04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe 28 PID 1528 wrote to memory of 2164 1528 04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe 28 PID 1528 wrote to memory of 2164 1528 04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe 28 PID 1528 wrote to memory of 2164 1528 04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\5DBA.tmp"C:\Users\Admin\AppData\Local\Temp\5DBA.tmp" --splashC:\Users\Admin\AppData\Local\Temp\04fd00b5f5040fca407a16843c14a9b2_JaffaCakes118.exe 1287E733109C35E91F2F05B48F30BAA6765566224E37BDF17CF0683E3DB0CF7706A9F4D02054CAF664DDBBA780FC998D18F556B7AE2010882F6B26A28AFABE612⤵
- Deletes itself
- Executes dropped EXE
PID:2164
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d6cd18b163ce34493451e3a340505aca
SHA1b61b6019307627d66918e6f8705e5a0df3e6529e
SHA2566e28b31cb340a0bb8c0c5f940eeff03fd85b4bab24b15e3034cace8008bbbc03
SHA512a4e9b8ffc694d7851c0e6b37af3ce9ceb866b0b60bc0f26c7703d522b994bef70dc5ffd8e8fc9e2895194a92d6aaa38ded12dfdf5212ad1a44db153adb8a2fea