Analysis
-
max time kernel
115s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
dbeade4b6a6e733c1d40e75a9d35077c
-
SHA1
5be0ffaa4025ccf9b1e9b9c8f8806134e46bd3db
-
SHA256
abf34fdddbe98f158f84191c896bd4ca55e5fb4fb1eff09353b250d5a076cd90
-
SHA512
f6a3b82960298d63b3ee95b705fc488d0cbe9e830194e11c2ca7a28eb77ab49a5970305e522d1256afe373979f1838a1a4107f7328f53f3367f029633f1d1b3d
-
SSDEEP
49152:Qoa1taC070d+aSQHaqatRcbl3ZfrrjTYWHQdtpCaem8Jw6:Qoa1taC0d92atSblBjTl8C7Jw6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3800 74A3.tmp -
Executes dropped EXE 1 IoCs
pid Process 3800 74A3.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3800 4392 dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe 94 PID 4392 wrote to memory of 3800 4392 dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe 94 PID 4392 wrote to memory of 3800 4392 dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\74A3.tmp"C:\Users\Admin\AppData\Local\Temp\74A3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\dbeade4b6a6e733c1d40e75a9d35077c_JaffaCakes118.exe 16D4978CB80DA6757BB2749346EDD9C9B80199BE1C65C91670F7DB2F0E59C5739F0353B456429A85D2B3B02BB707869B41CC3913CB2937E1DD348CD354D824632⤵
- Deletes itself
- Executes dropped EXE
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:81⤵PID:4700
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51d2dd53587a7c7065f35f08a5eeb3585
SHA1ce8837be83f0ec1d5f1cfb560f2a519f745ed33f
SHA256035dfbc0a8fd814aefe51afca55bf71e9ea596d023a2e225704b8d2ee55181d4
SHA512e316b9f18a567ad80198f918b7f73fdecc2824f03aa1de0e2292717de924001838537c5f9316de75f651c429976d2d135fb5de99841ab933c2d9a3da57a48a31