Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 01:55
Behavioral task
behavioral1
Sample
e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
e8f2cdcc41071630c65f958d688e75a4
-
SHA1
22d4166c277d50e338b2c1432720f91ceb7eed57
-
SHA256
6938215029fecc79b97ea58aaa33d721e7078af9b14aa8cc848d55aed653a7e2
-
SHA512
7aae273b1e04ab510818886b67d6f763267e81b102ecbb8b8a4f07c7f798475cf8b5b175cc9135769e016d84653a20b8b582881b6c198781c9f507826f8e5e9f
-
SSDEEP
49152:51zajJPlAaWvlkgC3VXpKLXl5FOfo/1LpLBfIlcDC4V38rzRGbW0l5H0RwKMMp:KjhM67KnsWLpLBA+C62zR2H0iKMMp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2660-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000d00000001224c-10.dat upx behavioral1/memory/2660-14-0x0000000003630000-0x0000000003B1F000-memory.dmp upx behavioral1/memory/2908-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe 2908 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2908 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe 28 PID 2660 wrote to memory of 2908 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe 28 PID 2660 wrote to memory of 2908 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe 28 PID 2660 wrote to memory of 2908 2660 e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e8f2cdcc41071630c65f958d688e75a4_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5bbadb8e84b53020949e33559cb57d0ba
SHA1c4cc3ecdb4335fbfcd85529d9df939a7f6cae81f
SHA25684ed83fe8035cee259e3de418ad3049816bb106413a4803c648334ddbe3f30e7
SHA512a1ce918fa308c72a71fb7b77dc54ea4c56c0bf33df37601da7de79a9357b5542ea56e55a58b50399fde9443ce654795a5a6588d8e925378c803d9691174e3b28