Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 07:33

General

  • Target

    cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    cd779930f8526defc540a789dcd31f48

  • SHA1

    7bd17495300826ad5c698bf0536fa9a4e7dee1de

  • SHA256

    6313281c90f78039ba2f7393510f5f16c8b18ab22b6ce3bb40bbfde68591beaa

  • SHA512

    9b793bc64bf698a6d5217b5aebf086a669af91760e07b7700b5e4f479b602c0682be40e7375f42c152676ac201a3bacafe44c7c8e3643fa830cddf41f050ff8b

  • SSDEEP

    49152:Qoa1taC070dj9GMfAbAzGZF35KnnW197Fg6x1ZIi:Qoa1taC0XMfGYI3cnW17Nh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\47E9.tmp
      "C:\Users\Admin\AppData\Local\Temp\47E9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\cd779930f8526defc540a789dcd31f48_JaffaCakes118.exe 5A8BFEB633B338DD2CCC92F81CE824F05840E8A46282C42ECF8D4F7D60A8D745C94DF61493EF568F8B7611CCF45102F90EB7630BFEF2B846995F55B40039BF47
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\47E9.tmp

    Filesize

    1.9MB

    MD5

    cfb81abae78693b27bd3324372cb98b4

    SHA1

    133830255e711de5a30f46a8eab746624cff06d3

    SHA256

    0936004db81470cf769fef30f8afe89ed619802716df4977461310f8394d2f5e

    SHA512

    beb1026d061426ec71f087616ac9a1f98ab8dfb11ec08ea61d83118c08859b5eebaa581c0880b3241bd3767fd18e2a0060d52e569874062d6af5447f01315905

  • memory/1660-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB