Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe
-
Size
427KB
-
MD5
c80b2ac9cdf62751bd5c938c7f09c4fa
-
SHA1
7d4acc658ab88ba85779727d72537c1cb16083a4
-
SHA256
9b43975a310597da899a90b003db179d82d696f215d1d6868f0e503350859b3f
-
SHA512
215076c2033628c19386255f45543bf5f52764479dc8dbcb5e7cbbe0b29258843d2864c0a09d9a6c162f5dcf887a9a1d85642923b4481cf3c3cdc0728ea1b5c4
-
SSDEEP
6144:MTykDONo0jv7IoPfeq1ZzxRJbL7f5LAh36rSLL64j7W4+yQrOx5Yszv8Q68RzrWs:MLry/neyx7f/A64j7P+tixhT8UqY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 you.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\ibqul\you.exe c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2016 2032 c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe 28 PID 2032 wrote to memory of 2016 2032 c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe 28 PID 2032 wrote to memory of 2016 2032 c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe 28 PID 2032 wrote to memory of 2016 2032 c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c80b2ac9cdf62751bd5c938c7f09c4fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\ibqul\you.exe"C:\Program Files (x86)\ibqul\you.exe"2⤵
- Executes dropped EXE
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5d436544e9a910d70822d2c2473f0ba1c
SHA136128c76ba41854be4bd3f2d6f5459bd5d99a3d5
SHA256d8cbfd5b178e6bef0b03e0683f54aaf749648a7ea59a5caf1c547583caec8078
SHA5123a145981ffb151c1c3d0b2fdec2394433ff7313c7a9d144e8e7881003f9b86c25ff25b051ccbdb823987d68e366e7e553df72264484e63114c11a4e9fc22a5b3