Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
1f73194f583dab29bad91b7177130c92
-
SHA1
32785b0a84ebc1352c87482a517f463e3f00476b
-
SHA256
3a190f5003f530f8cd1bdbf9870deb8b3329adad6dd0707edb49ea68faddd713
-
SHA512
ab811ab0234dc8886c55a096226f37c71819e800290e7cdabe1b034ad208c663941fbf3ded2f5753a4dfbba06335c98607537b8af8c2e773d27a2a36882ff2ff
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dYgKpoYTtXwLiJ6TcyrrTP+v+COaTHUzMmmH5:Qoa1taC070dYpoYJX/6wyrGvVlmY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 2FDA.tmp -
Executes dropped EXE 1 IoCs
pid Process 2980 2FDA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2980 2168 1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe 89 PID 2168 wrote to memory of 2980 2168 1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe 89 PID 2168 wrote to memory of 2980 2168 1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\2FDA.tmp"C:\Users\Admin\AppData\Local\Temp\2FDA.tmp" --splashC:\Users\Admin\AppData\Local\Temp\1f73194f583dab29bad91b7177130c92_JaffaCakes118.exe B006BF4D6D24DFDB3A747309434B709EAE571076E765049396747D04514338E98FCD97FF2A94E5A9A5A439A7E025E0408F1EAA1592663C9AD897F832D040414C2⤵
- Deletes itself
- Executes dropped EXE
PID:2980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD584d99f0fdf7960bba52e51798aa88489
SHA19a913926661131759b07cd691f048f6b8a94a96d
SHA2569ee4e2e9ccdd5de544f45f1ba613eb7db82882cb6f6ee9fbce6d84af738cf8fa
SHA51226dd1cbd2d076992d73c31111e12cea32358f957aee9a6f2784c9cd890019b3d3c08dfdfd1ccc2c1abf3d64dd81ee7c5bfba6013849655f08133e88e96620f75