Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 23:52
Behavioral task
behavioral1
Sample
e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
e8bb0d0d6768f14df52988e783707a93
-
SHA1
d24931ce573612e7bcb665dcbe2d2771c500b89f
-
SHA256
d4766b6138aa61a0bcb631a215b01cd78f01ce960977e17ddf37ca7a53a8bb0a
-
SHA512
20752d4587ef486f72f51f38ba2de1f284df35cde7f36284c7ca8d98c6cb79b4ae9b1441517a9a7dcdcfe83024bb012faee079aa7d5953ef2d8544e316c6035b
-
SSDEEP
24576:qs1Hg02INnJOX+VlJQn/Njohh+V5c1hTy+kUbLZ2h48vSVB+Xs5E6Vh9waIqlBUs:nFp2enJOXEM/V3nI3kUvUh4pVB+sE6fE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2160-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000013a06-15.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe 2540 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2540 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe 28 PID 2160 wrote to memory of 2540 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe 28 PID 2160 wrote to memory of 2540 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe 28 PID 2160 wrote to memory of 2540 2160 e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e8bb0d0d6768f14df52988e783707a93_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5595afd3634a43258ea96e6c70a98be92
SHA1b98e1bb53ee0e4bf26272d7bf280554f79339dcc
SHA256713b611746db6bda7c727c84addaf968c6e9b3ec47776ab2accdd724f234f63e
SHA5120281b0bf5b9c640d1fe80645df6924166d1057f56cb9ff0270b6a08df4a7deec00a43d796c13b9ede47b4700ee0bbae5d6e45e268f82c07b3a38ec2feee63e31