Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
cfbc2c635e2211429639f3e9fbd589de
-
SHA1
27ece2d71aedefd6983fe70588df1a0fa6877eb7
-
SHA256
0d9deef41cdfe7a11ce1bfc0d8ab0291aab162a8360ec77df571693b3052fb7d
-
SHA512
47bedf723d90e52a5fbc73c9720df4be29a5a8103e0a015eb716defeec83f566181122679416bdcb4ab3d2af15775e3cfb531e1d7835f449468b9f4bc8e8c78a
-
SSDEEP
49152:Qoa1taC070dHPwRhdBvqVpV6YPXwzcvFJHpmDoG3F:Qoa1taC0MPrDQiwzCCD5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 11CC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2844 11CC.tmp -
Loads dropped DLL 1 IoCs
pid Process 2264 cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2844 2264 cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe 28 PID 2264 wrote to memory of 2844 2264 cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe 28 PID 2264 wrote to memory of 2844 2264 cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe 28 PID 2264 wrote to memory of 2844 2264 cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\11CC.tmp"C:\Users\Admin\AppData\Local\Temp\11CC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\cfbc2c635e2211429639f3e9fbd589de_JaffaCakes118.exe AFDECCBFDAC0AE48A0669629CFF2CD2DC1795BA010A31B45AF7AA718B4FB7954B98DEF4F46B53B32A9429F5EEE309D5927B0DB91BA5F7371565B2410A2B67E962⤵
- Deletes itself
- Executes dropped EXE
PID:2844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5e248ddc47dff4cf3117931788ded3910
SHA13a88dc4327ec74d6979176114f346c04fd53f208
SHA256f5e8044a7aae832c13261abfae9bb0a1f118ac6df7cc7400af7f7ca1b73b24cc
SHA5126f5ba06aa90ebacaa4059c1c21c1b9c20d545e1482b82414914129d1c1698916dad7884c9be838bf56d2c9ea3de6cc0f3b39af534fce9cb533c7cbd6aad8126b