Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 21:39
Static task
static1
Behavioral task
behavioral1
Sample
ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe
-
Size
82KB
-
MD5
ec0c49c348f4431b78cecea540a846db
-
SHA1
ceec681dfd4294ede5495c06c5f490f687e0755c
-
SHA256
4fd3e52c74a5e1bcd1ca9b7dda547c92ea3fff4903e79382746106fff1c70b8d
-
SHA512
19f4fb4eb5827cdb862cc63ba2eee5a44d920c58ff40ecce733ca3657c76c8ba584db3f003af7aec5bca56999bed0fd80482590361964e96306c5ec80d135153
-
SSDEEP
1536:/Z80AV/B+JPnowC7mNIDX+vMhxl8YkFQ10KW9Iu0/0DODgbwxRUWy4ICf3u:R8no/owCqNAXQQxsQ299CDAj4IC/u
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1368 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4344 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4344 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe 1368 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1368 4344 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe 86 PID 4344 wrote to memory of 1368 4344 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe 86 PID 4344 wrote to memory of 1368 4344 ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec0c49c348f4431b78cecea540a846db_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55c6fb442883b384d9159cc455d85b178
SHA10487e948e877d0b5b7c184774d740b3d2b1bdbf3
SHA2561fa87210ca7cdb5feeb5ba3f86754e774b69f854cc6ea1896a6af13e88d6bdf9
SHA512ad0a4ef9e8e2236c2fa0ae6e2721420522a9f24e6ebcc2b4c40f5063c9d0e220d6e4bbea60756e89d9986b98d54bec92e76d483105ec64e131eb9d461134da2d