Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
eaea422c805dde273429fb8e547bac27
-
SHA1
db666f7fab5110dbb4803f894ef7cc9bc83181fc
-
SHA256
0b47dc7aff965dbb9c8d9c1be4c4ab1bfe476d030c6170bbfd2f0e134762bff3
-
SHA512
6c7737b7dbcf67c5a49c9bd206a31a602d91f2a42c33900bde43e427eddbdbe490c6631c5bf63a735f83db4e4e41d8d2643e47e84cc8454650282c5decbe2fd1
-
SSDEEP
24576:qKeyxTAJj7PZFK30B3I9ILWDdhV1uBKqPk:qKeyRAwEB3w7DbuBKAk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1884 cmeg.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\lrmells\cmeg.exe eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1884 2060 eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1884 2060 eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1884 2060 eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1884 2060 eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaea422c805dde273429fb8e547bac27_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\lrmells\cmeg.exe"C:\Program Files (x86)\lrmells\cmeg.exe"2⤵
- Executes dropped EXE
PID:1884
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5be13e13ffb1c59201843e62081d100ac
SHA1bfe9ea18ee4980f5271f8ab0b10d48fc37a68c8e
SHA2569297e14b6b13d0b528b403c5cc793cba7e2bf447f163692f13b34e4054db18f8
SHA5129cda8f0f71a4776129e15c11dbdfefca3f10ef8746046f5197f29acbc8de5498bbb69c81d9806a1433c5d55cacd25006a9456628a039d4b6194a6d8dba51cfdb