Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2024 11:32

General

  • Target

    0495e26894b58ed363e6c95add026438_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    0495e26894b58ed363e6c95add026438

  • SHA1

    2a953a00b11c558ba293bb4bd695f23e85538694

  • SHA256

    68ed6ce56428a1eeb426d845fd5c155077353dfcc8b9db18c5acf5950cb08ff4

  • SHA512

    f0aeba6ae66dc8c8b4de438b81571ca7c9112d4e068ba9547053be6165e91b5429fab650984774e795a8c6d9a21b2c4055bfeb5f3fc5aee1824843f519e04aae

  • SSDEEP

    49152:Qoa1taC070dNV76ukwY/lNyiQNnM/c+tNx+:Qoa1taC0mV2ukt+N2x+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0495e26894b58ed363e6c95add026438_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0495e26894b58ed363e6c95add026438_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\CCD.tmp
      "C:\Users\Admin\AppData\Local\Temp\CCD.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0495e26894b58ed363e6c95add026438_JaffaCakes118.exe F9ED3B50EE9C83E466123BDCDC792566F4731E012D1AA8D975725F0B4BB522482C1EC44AF1A068F985A57F170FB4D0484980D3497BA942A07498A3E858B69039
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2592

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\CCD.tmp

    Filesize

    1.9MB

    MD5

    cf9c08d9e87063b20dc8349b69c9936d

    SHA1

    8e4e4670e926fb02d8ca12e14c5dfb923e105a21

    SHA256

    9bb1fc6bf3489ebbbcc2a0c09026d581007b58279717d031fecaa2f8df4e7f14

    SHA512

    114f3d89b4f2b7a85512e91a835697b8a279ae5d9fc3c0f7bbcb0f695cfa40d4e04c05c57b17a19e04678e14a258cde6b16d2c945b1b5e9df3fbaf1645c7c266

  • memory/2272-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2592-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB