Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 05:59

General

  • Target

    ccbe93257e3c314802330b8aec571dda_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    ccbe93257e3c314802330b8aec571dda

  • SHA1

    e0e346b7f8420aca2bc3054e6cb4844a826f4af8

  • SHA256

    34b99fdcee2d80d8b1b090f1d9b12e653cdb645f5a1dbd549d5df76b1242b88d

  • SHA512

    cda2da649af2f301a6fc940427025bd60e457d2c18fc2cdcf646652cf720b598a64398a372b078cac4fedf55bfe849a1cf7651422f82fe9c23b469969dfe5533

  • SSDEEP

    49152:Qoa1taC070dGLkNt10yLhBkMXfWp246Cp//S:Qoa1taC0vEJkM46CxK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccbe93257e3c314802330b8aec571dda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ccbe93257e3c314802330b8aec571dda_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\14B9.tmp
      "C:\Users\Admin\AppData\Local\Temp\14B9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ccbe93257e3c314802330b8aec571dda_JaffaCakes118.exe A84828A2E97171E2B3F61A455C60DC2A204735F596DCCF971BF8F80B4E7EE56EA4C45B0A45BC41896FC4AB7D8A65F37FFCF1D3B0E419FB94042738673AAD4BE1
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\14B9.tmp

    Filesize

    1.9MB

    MD5

    fb57b5feddabc9ea34d99e1e7ea7bfae

    SHA1

    1eb194862d2dc29f4c7437df9b36ff0e94d2f90a

    SHA256

    8ff544db215d92787a99105e84b9ec87d4d1f7ca6b1f8cd35d65b0ee322b3845

    SHA512

    0f6d7c8c74f95b9e65d3c520ba237054ad34317cf124ba01291b14d8e0e4cb534806283d9fd73f406d7110fec5cc919cbc07c377114fb3f4927f043352c34b38

  • memory/1736-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/1948-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB