Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
18dc771fdf1a3e1b7768b47b8a15b258
-
SHA1
a5ebc43a0cc56727a4ddad706ae915aedd952f3c
-
SHA256
cfc395fcdd7733946cab8e16953149ceb0841758004e9bfcaf9a9aa57e6b2be5
-
SHA512
d6ce96f88d8fffdb3303dbedca606bece7b531d76f4136b5021c09b1b1014f1d08cdce2cdbc2d557798d844ea5e739405e048bf7547034ae3500db0650b92279
-
SSDEEP
49152:Qoa1taC070dUX8hUn+Cj0KxY8C6ZgPNbEAUEB:Qoa1taC03XQaj0KzZgPKAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 16AC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2088 16AC.tmp -
Loads dropped DLL 1 IoCs
pid Process 1724 18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2088 1724 18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe 28 PID 1724 wrote to memory of 2088 1724 18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe 28 PID 1724 wrote to memory of 2088 1724 18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe 28 PID 1724 wrote to memory of 2088 1724 18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\16AC.tmp"C:\Users\Admin\AppData\Local\Temp\16AC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\18dc771fdf1a3e1b7768b47b8a15b258_JaffaCakes118.exe E7BCB8E57E963CD8532E51CA7A2AE5CC9E535518ACCE92282719A795DF127E7C0C05B969EAF661861A3DA3F203F36020FEC4AA4E0D280EB867B882D7FD99E89C2⤵
- Deletes itself
- Executes dropped EXE
PID:2088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56d05870ce51823903f57cd07d5f5153d
SHA16fe581a22fbcb3d9c36914c1c498e0791760a49b
SHA256e7676ec7f799c2e90a504f8b06458c69077dacca01a31144918323e49b73e2b4
SHA512b8de6d5d9049a3a24514ac2f2c3227166adedb2b70cfb4f4004f8acd9a43266f2299811a7f9ff9b4b10c44baee9c391ba98d0f7fedad2f4029b2514d1b4cd31e