Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
d12e753f5a83fd133c6a6c552ddd84ef
-
SHA1
d0ea04ae2fc8b223a00734763f00c20a0ffd3de2
-
SHA256
5f8300ac69b0828a7822ce2cbc369441edf1d479d8d8f06049707a8bfe46e58d
-
SHA512
b822afe8878b8a6a4c9b3a279ecba2d030c466e6d70c3c765658966e67dba5f6494b63ef2875c2306f66dbba676713e5e1db4e07ba6a5667c26c1e43062c12d7
-
SSDEEP
49152:Qoa1taC070dpmOnirKtujlbLkY77W5+uSNn81Jp:Qoa1taC0Mn7uj5L77U+d1a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 5032.tmp -
Executes dropped EXE 1 IoCs
pid Process 2484 5032.tmp -
Loads dropped DLL 1 IoCs
pid Process 1048 d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2484 1048 d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe 28 PID 1048 wrote to memory of 2484 1048 d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe 28 PID 1048 wrote to memory of 2484 1048 d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe 28 PID 1048 wrote to memory of 2484 1048 d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\5032.tmp"C:\Users\Admin\AppData\Local\Temp\5032.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d12e753f5a83fd133c6a6c552ddd84ef_JaffaCakes118.exe F3F704FF91CAC24E628977B1ADFA19AFD6EDCD836383232A1A2376588ABCBB41F4E375D2F10627A82BD550EDFAF8EF81EDBBEB1486DA4E35D6C0202A6C5593E62⤵
- Deletes itself
- Executes dropped EXE
PID:2484
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b9b8573a85cdf0c0f2a0e4bf440f570d
SHA1b408aae6d5ce2d7bee1577a526acbf3ee203a0c1
SHA2567ad894a9148e6e10c4ce810313a34e41042b8d07f53e9798d5af0476f42f11d2
SHA512be8094b3b7a660dc55ac5ca61b1c53401bb96a745049d6fdcd07b6f16d0e8a550ac41edab94eb027e6c8c46ae628171fa1e209077e9f72412b090a4fc3121e42