Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 14:37

General

  • Target

    0824d597674499d714127de660390169_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    0824d597674499d714127de660390169

  • SHA1

    b1dcd3267313fb3e89b0958a064e5718c70d7198

  • SHA256

    3faf249e2169ac808176136dd2af3e94ba1782de67136530179f17d7ad307d00

  • SHA512

    d9b75a17a5f73b28895b598178a81ebaaef57302cfa6d7b1fe8c8059e0610cc16843d6868fb1e738430625f1748f43c9fdcebc882b3d76f340dfd972918ed8cd

  • SSDEEP

    49152:Qoa1taC070dDj1vc5gjLtPPzh13RCOMfoDmDzE+:Qoa1taC0Cj1djLBFlRBZmXE+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0824d597674499d714127de660390169_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0824d597674499d714127de660390169_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\40D7.tmp
      "C:\Users\Admin\AppData\Local\Temp\40D7.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0824d597674499d714127de660390169_JaffaCakes118.exe 4B6814FCB980DA9E1ADB953695E3ED0BB7FE1E3D9D7BEC0F91CCEE894C478E8DC385D1579ABDC1546688BDF584303FA6B12C8615AF461CEDF2DA734D19E4BDB1
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2708

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\40D7.tmp

          Filesize

          1.9MB

          MD5

          1146d67fe587dfeb3f3466cfd3205cc1

          SHA1

          8402a44fa18becd9acdff8a66ac95241814e44a0

          SHA256

          d2af69e787c72afdefce5fbdd95544a99df75648379914f299bb735ae772f365

          SHA512

          417a44fcd5bed555d35951964992cc2adc6239f581803dc6822351f9f65558a675d4b41d30080b79716d2fa66278d3c5437c5a7c48c73bf7fe50c33f5c5a925a

        • memory/1900-0-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB

        • memory/2708-6-0x0000000000400000-0x00000000005E6000-memory.dmp

          Filesize

          1.9MB