Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe
-
Size
82KB
-
MD5
e9888c1972b2ad7eb797d48552dac0b8
-
SHA1
30307235b28dcb1dd33eca8c08ce4af8a421afe5
-
SHA256
3739b046a4816b07a0e58e2c62ab331718b6f77d763e34c118340c89539b2d58
-
SHA512
4dd8a4f09c245e85af86254997f2fbe7ef01d62803741bb3883f29def23aded56143b7e1aa6a086b5604a06d2d9bab59bb91095dfc3a05125c0f866989c2108d
-
SSDEEP
1536:Y/GngAN7GEUltPIeIehWCtBlXM2nIL/jIKP8jFtHuPUSAS/XSh:Y/Oy9oeIY3tpna/jbEh1uXAfh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3544 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3544 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3300 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3300 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe 3544 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3544 3300 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe 86 PID 3300 wrote to memory of 3544 3300 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe 86 PID 3300 wrote to memory of 3544 3300 e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e9888c1972b2ad7eb797d48552dac0b8_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3544
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD545a7d3ed20dc44bfa941e14aa741461e
SHA1c873977745663b8b4e6d3f67df8a45b748bb192b
SHA256456cfd94425fe0be420a5fb0ef3c55ff4ef5be06c0cb8fa809a64a021b65f147
SHA512a31b0e63caeae312cee3f817e26dc6126a13948570ee9ecac92a4189ef1f55afe2489c6ddec283320a9b900dc4b407dba41ceaa57b30e9df8737e5bcc66c55f5