Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
0db01fb3aba99dc18456d390216f991d
-
SHA1
b239fa607f0ab57b960b6252046e27d24ca94aa8
-
SHA256
db584935d8ac1512bebdd60ae2758bccae94663acf19a2bf1a62145b5318e2d6
-
SHA512
bc68df7e27a443056682e87d4178c7a32421fb24cd0f9c10c7d4c19e7e00bf15d6c07293dae3f52e70e89d8a1260eac2b522f6fbe54daab010c93db29825c00d
-
SSDEEP
49152:Qoa1taC070dtR/dAIzYgh8GUzXbKu1clsNczEhsZO:Qoa1taC065zBhmzrxHWwhs8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2148 6C79.tmp -
Executes dropped EXE 1 IoCs
pid Process 2148 6C79.tmp -
Loads dropped DLL 1 IoCs
pid Process 2692 0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2148 2692 0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe 28 PID 2692 wrote to memory of 2148 2692 0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe 28 PID 2692 wrote to memory of 2148 2692 0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe 28 PID 2692 wrote to memory of 2148 2692 0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\6C79.tmp"C:\Users\Admin\AppData\Local\Temp\6C79.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0db01fb3aba99dc18456d390216f991d_JaffaCakes118.exe E2D87BEB88FAF3FB6AF6AA72C681AE9F70231E877E7F1752C8C5A74E629602926545808E642A4EDB1159881F3E12727C422897D524DFA68289FFF82575188DB82⤵
- Deletes itself
- Executes dropped EXE
PID:2148
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD537db8b44c26d62a815c4f1dca4adaad1
SHA145c39cf81994dcae0cd921464145d845c32cf098
SHA25682f3b95ff70e3a56843724a487965ebfebfc8674ea7561348ce82fe49e6193b8
SHA512559ce0f9246e2a1c425d5878dfb096bded61ebf001e0d7eb6d281653d99f7dae5d7e0b81fee690c8f786f1cf5a6f837a5869267eedc32a6a783591a540bbb781