Analysis
-
max time kernel
96s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
dcf5ba752c06695e3b8cefc3d32333f0
-
SHA1
e0d74a1e7c8e3a1bdc8a9669a1ae55316dbeb347
-
SHA256
66fa360ee9ad50375094c7b143cff53aafc711e3409de5ea584ff948edfe19df
-
SHA512
b75677eb4ae29b684f9a51359e922afe0deaa12975a34f4926a9a4da5353fa60c569adb5013043930a959febd174c50fec9480341156d311ed7f39c3877e6c15
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dlgwFd/AX5LbgQJm0YLTSLKHYYgWcYYaZ44JL:Qoa1taC070dlgoQ8LTSfWcYFOqXPv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4400 47B7.tmp -
Executes dropped EXE 1 IoCs
pid Process 4400 47B7.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4400 5052 dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe 88 PID 5052 wrote to memory of 4400 5052 dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe 88 PID 5052 wrote to memory of 4400 5052 dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\47B7.tmp"C:\Users\Admin\AppData\Local\Temp\47B7.tmp" --splashC:\Users\Admin\AppData\Local\Temp\dcf5ba752c06695e3b8cefc3d32333f0_JaffaCakes118.exe B231FAF3B046B81DC778219E5E49CE543A01B55A81FDECA403C3D063BED6E3628A0D4567785221844FC2F5B68E727753F03C7285EDBF9245F4520F7BC40693432⤵
- Deletes itself
- Executes dropped EXE
PID:4400
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5923b69e229d0de8d8461d8de9a949cd7
SHA1ac3dd35284247dfc3b6a11970c4bf0765b25b163
SHA2560270d7ce73ca8ed42c22f90b3b483d726080da27aae4ef40b4cee5d8683a77cc
SHA51203e1318d499d531f943867cef6b52103bbed2a676191566ed0b41d41105ea9c324658fbcf4bd9433111747793e60ea8dc98242c9ba255e0f62b499ce5af6dfa8