Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
1673d1767011b821241033ef0f0bd0fc
-
SHA1
a4adc1b3e1743ff8979329ab1e7954d161d5337c
-
SHA256
49549e75448241a060af3dffdd03ab5b5243e493ca07b9a1519a5aa320e473fa
-
SHA512
da462bb4e2d15c525458923754bc32714fb5febd72b5b3c6aa9d3b120067e3f16a3ddb54d8ea56a84b0775d43ea76f119e0812ab0ad443764e94b6dbfc61f87b
-
SSDEEP
98304:5mSWOiIyU57Gs/WPwbo/4SjVLUjH5oxFbxx:5XnL/sUo/4SjVUjZEdx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 14A9.tmp -
Loads dropped DLL 1 IoCs
pid Process 2168 1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2032 2168 1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2032 2168 1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2032 2168 1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2032 2168 1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\14A9.tmp"C:\Users\Admin\AppData\Local\Temp\14A9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\1673d1767011b821241033ef0f0bd0fc_JaffaCakes118.exe 6BD905C8598A08E8EED20A8187F728B943216AD7C090642B49B45610EBA91D57373015529525A52324D6F17DF2EFD21E35113F67E9E80EF34AA611DB423774852⤵
- Executes dropped EXE
PID:2032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD570597e8f00517d690ee125f9ee69521f
SHA1ebde71605dfd29a0ba1c36c4807876d3cdfe656f
SHA2562771aa3cdd7b0eaa2a71320d8aeb05249dd42cab64aa9c7ef6209efe30f0b0d6
SHA512058c51ca089d1240b293c1631b984aa92ca1e260a0ba3d86a3f0f59f4ec68c7b4ac913d07983fa8980b177ee235a2bf5f849ebfe58e9aa79b36a203a663b17b3