Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
258d7cdfb4ba37539c621be07b85ccfd
-
SHA1
dea70d71347da465fe623cc6f18c6dc0e41ee968
-
SHA256
0a7b71e5435ad7bb7f65e4f11fc62bed43a4abe6f8720666226bb31793c9cced
-
SHA512
1e4bea8cf5af23f8ff6584535d07a16339d4bdeed2dfaceb72407d0d290934dc49254b3f0047185a4c9ae6b38531a6902bc27b0c3bcbfce79deb065c23608c5d
-
SSDEEP
49152:Qoa1taC070d+aaS0frs+8mKSZoETQMbi8ueJScziD:Qoa1taC0NaZCt/wSm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 116E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2212 116E.tmp -
Loads dropped DLL 1 IoCs
pid Process 2328 258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2212 2328 258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe 28 PID 2328 wrote to memory of 2212 2328 258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe 28 PID 2328 wrote to memory of 2212 2328 258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe 28 PID 2328 wrote to memory of 2212 2328 258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\116E.tmp"C:\Users\Admin\AppData\Local\Temp\116E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\258d7cdfb4ba37539c621be07b85ccfd_JaffaCakes118.exe 1017D8753D5BCA7BA99288B3952DEDC60E3F98FEF7BE68E7B9F8BF43B83DEAB97AB45B825058DBE0FF58989F094C1444178EFC10F40CDC5E2F9C7BD72B88C4FC2⤵
- Deletes itself
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ce90536724eb901909a32feaffcec0bd
SHA15e7c880a7f72c0f76ad27e29ed23a9e2f67c23f8
SHA25670737ae9ef9c45008b734d8e17ec78282908bd47d0993e8307cc52610043c08c
SHA51229dfdf0e1326f2694623e3da9fdf35c7c2faf1a28dba850ddc615d3b98c279af0e96dee574e33e22bc3092317518eb075fdbe3c98856afc4c2fac4d26d773258