Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 07:13
Static task
static1
Behavioral task
behavioral1
Sample
de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
de8f7ed7d73abcc34e5fc68911b9442d
-
SHA1
aa7e77b826ba5780b288d3d6f4344b4f3df850d6
-
SHA256
fd7c4965b6a5973e4d3dad499518a609d0e9fa3c25ea559be1cf9b92b978697b
-
SHA512
d90b9c1a6f15df84f3310d54d373649a8257dcab087bc5af5fa18ad408b0fab0ed65e08612d6da7a6038c9672290dad5f0ffa1e4871b5bb1ca888a18ada7698a
-
SSDEEP
49152:Qoa1taC070d0a1/Vq0HZmQ5WE5TRSjL1awaRX:Qoa1taC0x3sl59TO1xO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1320 1304.tmp -
Executes dropped EXE 1 IoCs
pid Process 1320 1304.tmp -
Loads dropped DLL 1 IoCs
pid Process 1228 de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1320 1228 de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe 28 PID 1228 wrote to memory of 1320 1228 de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe 28 PID 1228 wrote to memory of 1320 1228 de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe 28 PID 1228 wrote to memory of 1320 1228 de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\1304.tmp"C:\Users\Admin\AppData\Local\Temp\1304.tmp" --splashC:\Users\Admin\AppData\Local\Temp\de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe DD98F34DD63083D44ED3E5228EDFBBD0CA50E7E9F80E9BC909CBB5098E559637B7B54CE66B43D5AF2EB358A4B312E2450FE8B22F1A5ADB6201882CC4BA9FF20D2⤵
- Deletes itself
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5254e52d16baa1c45ea3016863e7686da
SHA14d406136735c8b91368cf9d27c982c3a10191f93
SHA256151f43b794533629555f9883f253477ecd8b811e0b8d07579806a5ffe8beb5b6
SHA5127f6bf8f3293ad297c3a12036255009d6e317ffd204fe8682fc469bc836ecc0b04b52c4827ed7358cc23c821bf472b88495ebc522a6ebe2a0666ecd794654d990