Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 21:01

General

  • Target

    e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    e868f506fb9793d17a556118e39ee436

  • SHA1

    141c549f2a74424d6130314cdf0287e625cba069

  • SHA256

    e1a5adfe118fa2a20b950a50ae1368184fd7c3b939022d46cc9ef1c4726ae335

  • SHA512

    cd027cea3bcd08b07e19808514605969803b44b4d52dc6e73db129babe1668adda92798432fe5e58e2cfe0c7e2950ebe6d12a88701db4a82eef6addd09bc9764

  • SSDEEP

    24576:aEFA++HJvtW5cH19pNrBb058CK/k3ZoNJaVMEhu:Q+cvj9pnOzAk3uvaVMEhu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 20 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp
      C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp
        C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp
          C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp
            C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp
              C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp
                C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2520
                • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                  C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2596
                  • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                    C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2376
                    • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                      C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2408
                      • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                        C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp

    Filesize

    1.3MB

    MD5

    a128d727a83caacffaa86b68ddd8f6b8

    SHA1

    5da7c30092275b7aea0d53a16e0593f9c4135fa6

    SHA256

    a65baf681624106d8a4e7dfee8fb16d2c5d7da73f1b363eeaf82ce8740b440ad

    SHA512

    f922200897ff759315e9d06ca94a2d37de62679c075ba5c7986f7b6ea1241207eded51e7514f7ef1d73348796470178a3c8bacec97fbb5b8f863fd86c048b243

  • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp

    Filesize

    1.1MB

    MD5

    02cf6afa06aab04666c578debc5abcb3

    SHA1

    a922bd9c319145c30e31e4e8ce470b40bdc1fb7b

    SHA256

    d04269011b9e0c4cc3e5aabac8a37ad55c189224823beb9df9e965a0b8f7ede8

    SHA512

    ef4fe37163b1530ad932580fd28bef0a4c1024d6dbb0a8fa3bb4e76e9f7953970a9b0bb79c6a5312ed24d8a7f1dea8f473c16ec58c205689e380302c1d7f5f5a

  • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp

    Filesize

    1.1MB

    MD5

    0d42736e223df60e231404c3250db0f2

    SHA1

    ceaa0611cbf3f28585b5010b5036ed8b3071c262

    SHA256

    663d04ee2f02bacce72efe179dd0edd4a56c672eb2b144e074fa0bba8d6a64cd

    SHA512

    f4c973ff526824ef2493dd7390a00bd0592fc44beade7fdbba8b27f64f66faa1a89045795b1ee42e2140d1b574cd1fc0facd96036a64e14d9367b86fa36922a8

  • C:\Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp

    Filesize

    1.0MB

    MD5

    c804261f46bdb00022cb1e6806c9e240

    SHA1

    0a780952cb288674ebb09a1ae97c7da00cba9560

    SHA256

    c1a0bfe30fe4ebcff6040b99a311b6e3d1bb7c43521e16957fe1613488b2c2d7

    SHA512

    d7615d76d0f7926bdd6bfb331b83612b0373da2437a0bcc6fb15d2a76f1da243fe3b84553495dd3d0b92b0f3526c97d7c339d9587d8f05d236801a1eedf7d7c6

  • \Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp

    Filesize

    1.2MB

    MD5

    9d3778df546dc0f512578d3d5dc36d07

    SHA1

    43f023623040acd01d0b95577300a38d1ddbebf3

    SHA256

    0d59f4a3cf1667e0ad2f447a4698f753bd1a159765e6aae8c303d46c7ef6a152

    SHA512

    357a7fc3cb9a4f982c852d86baadd40581420adea01a79957a198fa93a9dc7c040fe1efebd3d829adff5e5fda2d4e7454ade9ddf0527b6eefea99a8669e3faff

  • \Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp

    Filesize

    1.2MB

    MD5

    bf137019a3b38af3199117362e297cff

    SHA1

    50f764c73c662743073249d1c96473df9c350ac3

    SHA256

    51373ddacfc8c2d4e575d1e9371c21cb42755a21de4557d8e870b8431f678f1c

    SHA512

    3dc40c4d90c6db3d90b33bf819425eb32fd3b17692eff46486a3920a8b9cb4ee3249db686c9d7bce53b45910482e89c1507c9dd64aa6036257e9dd5fda150d62

  • \Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp

    Filesize

    1.2MB

    MD5

    db3b04d9b6c1b6a00c3458312bb55aa1

    SHA1

    fb63481f9bc4889f9ce68dcc8fa0768266fc6595

    SHA256

    25eabc8ad561f29237b2ec0b5cb84190ce5bf05005bdb4840cc65d34e4c58094

    SHA512

    2c999dbc1f5a5c4c61d423821ff980be3bb1b7358650ca827134af5cc0d347fb49d01cc1d8b837e42eec746e1ef1f328a0284ab83b0220a4a88ad5f436a5658c

  • \Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp

    Filesize

    1.1MB

    MD5

    9ec1054df38e269b2e3688c16d59928c

    SHA1

    d49e722b7f5f9b9251d46bd0ac0b8b472f2dd71d

    SHA256

    ef0e3b703deda90b7d16d2d5402a96fe194f7592ae1b2fad840d8acf7aac2647

    SHA512

    44934e5a8d7de91a02fb96c22ae8cfb1bdff42cbb1d191e7eeb58bafeae8eeb4ab785ac8bf093304c08db8ef4e028d94386d411d26e2c5afc661e8adb907428c

  • \Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp

    Filesize

    1.0MB

    MD5

    0cbe5f337597def533eccf0c24f651f9

    SHA1

    d0fb79514b450e5c128eaf6afe848fbd0ddf3265

    SHA256

    d154ea4f19958a6b0cc3463e88ce4efa85f9e7b9726fc78c645c80bbbb2ba4c1

    SHA512

    6756ba94f83cb4578282b0026999babe564df402006674930f3a4fe1d850df777bdccaa2f1f6294feb228d11518c5be08acbdd874b2368a2f5e8eac6cc2386ae

  • \Users\Admin\AppData\Local\Temp\e868f506fb9793d17a556118e39ee436_JaffaCakes118.exe.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp.tmp

    Filesize

    1003KB

    MD5

    9e47a15fe1c2489190263f0498837b41

    SHA1

    112ceec5386bdae7c90cb94b2665d16bc9432915

    SHA256

    dd89875d8a98bf815917ef608ecbca5fc9e0b185c6b7d0f899e5376b92da6446

    SHA512

    38d35ede6f98fd6ee32c18d0cf9815ab111c5ffdfed096a2f658d49c20c9b24d2cb12f2203277490ea3c48ae3ae8d88505c50af9496cb2c1d690d017ca94c4f7