Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
cd779930f8526defc540a789dcd31f48
-
SHA1
7bd17495300826ad5c698bf0536fa9a4e7dee1de
-
SHA256
6313281c90f78039ba2f7393510f5f16c8b18ab22b6ce3bb40bbfde68591beaa
-
SHA512
9b793bc64bf698a6d5217b5aebf086a669af91760e07b7700b5e4f479b602c0682be40e7375f42c152676ac201a3bacafe44c7c8e3643fa830cddf41f050ff8b
-
SSDEEP
49152:Qoa1taC070dj9GMfAbAzGZF35KnnW197Fg6x1ZIi:Qoa1taC0XMfGYI3cnW17Nh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 47E9.tmp -
Executes dropped EXE 1 IoCs
pid Process 1940 47E9.tmp -
Loads dropped DLL 1 IoCs
pid Process 1660 cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1940 1660 cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe 28 PID 1660 wrote to memory of 1940 1660 cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe 28 PID 1660 wrote to memory of 1940 1660 cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe 28 PID 1660 wrote to memory of 1940 1660 cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\47E9.tmp"C:\Users\Admin\AppData\Local\Temp\47E9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe 5A8BFEB633B338DD2CCC92F81CE824F05840E8A46282C42ECF8D4F7D60A8D745C94DF61493EF568F8B7611CCF45102F90EB7630BFEF2B846995F55B40039BF472⤵
- Deletes itself
- Executes dropped EXE
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5cfb81abae78693b27bd3324372cb98b4
SHA1133830255e711de5a30f46a8eab746624cff06d3
SHA2560936004db81470cf769fef30f8afe89ed619802716df4977461310f8394d2f5e
SHA512beb1026d061426ec71f087616ac9a1f98ab8dfb11ec08ea61d83118c08859b5eebaa581c0880b3241bd3767fd18e2a0060d52e569874062d6af5447f01315905