Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
dfe3a7f5c9320df3cb3d3c613f4ccd03
-
SHA1
1290695033bb8adb69d73479138123d6773cc44a
-
SHA256
0e544bc6e770f6f0b76d68bd85bb9bfba55443dea4bf5c11278494540eb0aeef
-
SHA512
566d39358e12a3cca4ba98a7fc35bf89af521e0f72d2386b5ceb79af137c5367d7b01204b4bee230898ab770b5a36f79c9f4b2344e00f1a62a6946d5eca06fa5
-
SSDEEP
49152:Qoa1taC070dv1m4QuAcfci4itExDw8GAe/LpP:Qoa1taC0AgucintE5whAWdP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 548 41E0.tmp -
Executes dropped EXE 1 IoCs
pid Process 548 41E0.tmp -
Loads dropped DLL 1 IoCs
pid Process 340 dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 548 340 dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe 28 PID 340 wrote to memory of 548 340 dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe 28 PID 340 wrote to memory of 548 340 dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe 28 PID 340 wrote to memory of 548 340 dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\41E0.tmp"C:\Users\Admin\AppData\Local\Temp\41E0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\dfe3a7f5c9320df3cb3d3c613f4ccd03_JaffaCakes118.exe 0308565872F867AEF3B630382D363C2039852AA710D215254E4FE50B714BE966FE2EF9691636491331C21375A7C4B64BAFF68751FD71C0AA9E8C8387BB1067F82⤵
- Deletes itself
- Executes dropped EXE
PID:548
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD50ba9b1fca195fbf7c913261c9ead31aa
SHA14e2b9a6ac65d905bce2524205da5d3ddbcce17fd
SHA2563cddecd22486073d86a77790d215bd136593c6b11fd9a816dd61bb400f842e9d
SHA5124f6a4a37c5895c1849fca0fe99925048d64e4fcfc6b5ffe49f8e6d4b7150001a26901f682039d72b684726b55c486944cabcaba58dba821c316ad27315a0a44a