Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 13:19
Behavioral task
behavioral1
Sample
e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
e78c9ce6b5ed2df814e4ec80fb616ce9
-
SHA1
1065b353bebff7792c92d655530024ee82fcb87d
-
SHA256
d08f32178a8e9a3ce86ca648384ffef4bdaa8007ec8fe211241a3e8785f96fa7
-
SHA512
10f3e8cd8954a16f00bf5ad27d6e66ec3a65394c8c43b61d53262f030b2fc5d1c33b4ce1477ab2d800e8b188de734e3fe3ac9820b86530c6872972ec68a33d04
-
SSDEEP
24576:NMA1qylZ4ZJcSU8pHdjPGdaDC/z6ssvG:NEKZmJJUkIuC2s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1616 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1616 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2840-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x00050000000120e0-11.dat upx behavioral1/memory/1616-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe 1616 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1616 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe 28 PID 2840 wrote to memory of 1616 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe 28 PID 2840 wrote to memory of 1616 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe 28 PID 2840 wrote to memory of 1616 2840 e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e78c9ce6b5ed2df814e4ec80fb616ce9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5912f8bd322d5b9f3f329a2802b0016b1
SHA116af255ac2c8383d4ae959721a64cfe77bb103d1
SHA256427f49bdf265e276325ff98f291545e2953858cd66b4df2b2f8048b269a84c8a
SHA51227dd579e8af437be4d511a7a22a7736d0e65cdb71c104c6a9eb87fc78d4b3af902c1aff4ccc5b1d066edb395cee639a23e72f1731c1e3ead82f1c7c860809ebf