Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
0495e26894b58ed363e6c95add026438_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0495e26894b58ed363e6c95add026438_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0495e26894b58ed363e6c95add026438_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
0495e26894b58ed363e6c95add026438
-
SHA1
2a953a00b11c558ba293bb4bd695f23e85538694
-
SHA256
68ed6ce56428a1eeb426d845fd5c155077353dfcc8b9db18c5acf5950cb08ff4
-
SHA512
f0aeba6ae66dc8c8b4de438b81571ca7c9112d4e068ba9547053be6165e91b5429fab650984774e795a8c6d9a21b2c4055bfeb5f3fc5aee1824843f519e04aae
-
SSDEEP
49152:Qoa1taC070dNV76ukwY/lNyiQNnM/c+tNx+:Qoa1taC0mV2ukt+N2x+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2592 CCD.tmp -
Executes dropped EXE 1 IoCs
pid Process 2592 CCD.tmp -
Loads dropped DLL 1 IoCs
pid Process 2272 0495e26894b58ed363e6c95add026438_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2592 2272 0495e26894b58ed363e6c95add026438_JaffaCakes118.exe 28 PID 2272 wrote to memory of 2592 2272 0495e26894b58ed363e6c95add026438_JaffaCakes118.exe 28 PID 2272 wrote to memory of 2592 2272 0495e26894b58ed363e6c95add026438_JaffaCakes118.exe 28 PID 2272 wrote to memory of 2592 2272 0495e26894b58ed363e6c95add026438_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0495e26894b58ed363e6c95add026438_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0495e26894b58ed363e6c95add026438_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\CCD.tmp"C:\Users\Admin\AppData\Local\Temp\CCD.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0495e26894b58ed363e6c95add026438_JaffaCakes118.exe F9ED3B50EE9C83E466123BDCDC792566F4731E012D1AA8D975725F0B4BB522482C1EC44AF1A068F985A57F170FB4D0484980D3497BA942A07498A3E858B690392⤵
- Deletes itself
- Executes dropped EXE
PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5cf9c08d9e87063b20dc8349b69c9936d
SHA18e4e4670e926fb02d8ca12e14c5dfb923e105a21
SHA2569bb1fc6bf3489ebbbcc2a0c09026d581007b58279717d031fecaa2f8df4e7f14
SHA512114f3d89b4f2b7a85512e91a835697b8a279ae5d9fc3c0f7bbcb0f695cfa40d4e04c05c57b17a19e04678e14a258cde6b16d2c945b1b5e9df3fbaf1645c7c266