Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
c8d82f04af1b005ce3e09adc0ea1af86
-
SHA1
4854a81ec487342cfc5dcc1ba15b71ebd55c91a1
-
SHA256
f7de1afaad1a9fcd00005e07bf228d304e4a0aa690852dfc1b0ac637e940b97c
-
SHA512
e90baf9ec99304f1dc2738b5fe97faed5e4aa772a08c545d0a78089fedf33d7ccec84e5fadc10a6fae2f0bbd7fa2400a54d906359011abec22c01c8d3f4c0991
-
SSDEEP
49152:Qoa1taC070dn2qVzvZpYioUiPef/bcmis7qhhuP:Qoa1taC0S2czDYjUiPWJ7q2P
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2544 250E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2544 250E.tmp -
Loads dropped DLL 1 IoCs
pid Process 2000 c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2544 2000 c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe 28 PID 2000 wrote to memory of 2544 2000 c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe 28 PID 2000 wrote to memory of 2544 2000 c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe 28 PID 2000 wrote to memory of 2544 2000 c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\250E.tmp"C:\Users\Admin\AppData\Local\Temp\250E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c8d82f04af1b005ce3e09adc0ea1af86_JaffaCakes118.exe 106CAEAB437BB428DE6C1B86828BA95064DB6E81B4138C73842963E8C04D090594D1855A4A75B7004A46D5DFE1164D98BF2DBB4D143D0369D16B32C9348AB99A2⤵
- Deletes itself
- Executes dropped EXE
PID:2544
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c3e10fb4f8ba0466a9cda3101c4d923f
SHA1ac6a0ff6da0329d39d89126780fa8d4d178dd6b8
SHA256192a4b00ff1a8a4099a2705a4900b664ca976d7da39c2e496d0beac1ac422816
SHA5120b466041970739abd1a6613a085b58e0aba5800bd3956b02db1a23c8aef5af81f4a83961a8c2a47380293b584713c3d12165f36295262246eec529cc180dfb17