Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 13:35
Behavioral task
behavioral1
Sample
e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
e793a61e51b7f13243ce48c7142da7eb
-
SHA1
46d670da2c27b4cb8d69243fd94e331cb8eb9e2d
-
SHA256
d6c3ff8579e2e9a96de16083a7e30eaffe367af9753ef11db3ba97ce09853459
-
SHA512
9356fb0efff039c3d3eaa0d74bd25082ce7ea61d0e4b162b5ffc0cc03b0fdff7596e38e00e2ad20acaa93205f1980d7db2df09192bfac7c90db6023e70267407
-
SSDEEP
49152:T/kA93G5nnKmuebSR9WEA+LkJK7dygL1EKUwOk24euBFv7cVxFhcyp:TTVG5nKmue+R9WEA+LkJK7UgduZi7cVV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2044-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000900000001224e-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe 1216 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1216 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe 28 PID 2044 wrote to memory of 1216 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe 28 PID 2044 wrote to memory of 1216 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe 28 PID 2044 wrote to memory of 1216 2044 e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e793a61e51b7f13243ce48c7142da7eb_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5067d45c90488c9ea01193bd6b20c2936
SHA12d40cbbe8da1d7fec7f9b34841e9eca47a8bef5e
SHA2567562c6c3b7cbe294a1aecda0744e4769cb7ba91aaf2d2818303a459e52f52565
SHA512bc7c374cf56312625ef841b1d68d96a737d8dd6f5344b6919ab6ad7411891e83c518145f43c1f10028c9b0b0a86cd5d4c461537a0aa3fbf81c137693e8584c10