Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
e9b99409fcde2123a5dd05bb763cedde
-
SHA1
19d92f61cdcb4bdacc808ca063114a0be4f569e8
-
SHA256
1bfb361bb63bf9bdd59d1530e487316659e691149e6ac740db0977743a94d83f
-
SHA512
66204522df742c482918bdfe99eddc9c31e19138d25bc5fdaf6e98b61c590cde2863dee02784955eb766e546104363f314f5346a2082c9ba39f0d9f8f804c1a3
-
SSDEEP
49152:Qoa1taC070dmzt2Z7AF98MkEeuDbrKCFRjRXYCUOF9:Qoa1taC07t2Z7M83ETbr5Yy9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 18ED.tmp -
Executes dropped EXE 1 IoCs
pid Process 3024 18ED.tmp -
Loads dropped DLL 1 IoCs
pid Process 2192 e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3024 2192 e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe 28 PID 2192 wrote to memory of 3024 2192 e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe 28 PID 2192 wrote to memory of 3024 2192 e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe 28 PID 2192 wrote to memory of 3024 2192 e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\18ED.tmp"C:\Users\Admin\AppData\Local\Temp\18ED.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e9b99409fcde2123a5dd05bb763cedde_JaffaCakes118.exe 318D4FFFD9892F980C2C0D9F91519912FA68E9081C7A3C10B93D529A0866451A2EF08313871F64A31DED716088C213DF488E9DD5B7F3FFEF893B62E65615D1912⤵
- Deletes itself
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5140e79e456b11d59ece5dbf6621d7bcb
SHA1416687d0068a6cfe31249d64f9caf2c03b4875fc
SHA25627b8f7037a40c4fae5dd35287f684064ad082de0ff11457ff9920167959ac15b
SHA5121cb3d98a9dffbe2de0523a11660a2f2dc7d6cbfba0d86e8fd0de78a958cb914068021c3ee2ecf76c15869af10eec84f6d4c16962d5b25d6428c229f40581440a