Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2024 07:13

General

  • Target

    de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    de8f7ed7d73abcc34e5fc68911b9442d

  • SHA1

    aa7e77b826ba5780b288d3d6f4344b4f3df850d6

  • SHA256

    fd7c4965b6a5973e4d3dad499518a609d0e9fa3c25ea559be1cf9b92b978697b

  • SHA512

    d90b9c1a6f15df84f3310d54d373649a8257dcab087bc5af5fa18ad408b0fab0ed65e08612d6da7a6038c9672290dad5f0ffa1e4871b5bb1ca888a18ada7698a

  • SSDEEP

    49152:Qoa1taC070d0a1/Vq0HZmQ5WE5TRSjL1awaRX:Qoa1taC0x3sl59TO1xO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\1304.tmp
      "C:\Users\Admin\AppData\Local\Temp\1304.tmp" --splashC:\Users\Admin\AppData\Local\Temp\de8f7ed7d73abcc34e5fc68911b9442d_JaffaCakes118.exe DD98F34DD63083D44ED3E5228EDFBBD0CA50E7E9F80E9BC909CBB5098E559637B7B54CE66B43D5AF2EB358A4B312E2450FE8B22F1A5ADB6201882CC4BA9FF20D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1304.tmp

    Filesize

    1.9MB

    MD5

    254e52d16baa1c45ea3016863e7686da

    SHA1

    4d406136735c8b91368cf9d27c982c3a10191f93

    SHA256

    151f43b794533629555f9883f253477ecd8b811e0b8d07579806a5ffe8beb5b6

    SHA512

    7f6bf8f3293ad297c3a12036255009d6e317ffd204fe8682fc469bc836ecc0b04b52c4827ed7358cc23c821bf472b88495ebc522a6ebe2a0666ecd794654d990

  • memory/1228-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/1320-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB