Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
eb361d178f1ac83518ffe59104f3e9bd
-
SHA1
2070ebf90962759488e2582361b7438085d32867
-
SHA256
f07769a1eb1b4fd79166471c67d5eb387c9fdeb0fc8451e5a09e49b3d24a5f5f
-
SHA512
fe93645e5350ab5e9241f13cc8c8cc83583713bc32b60325b81e2bf515a2ca1abb162b01efd6cc271299ab44142f578dcf056b1cd1ac4838407305e41f1c3a5e
-
SSDEEP
49152:Qoa1taC070d/mla++jENfgJVJ/1+NGruII4Y5:Qoa1taC0jlH+V1tqH4Y5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 5E36.tmp -
Executes dropped EXE 1 IoCs
pid Process 2308 5E36.tmp -
Loads dropped DLL 1 IoCs
pid Process 2912 eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2308 2912 eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2308 2912 eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2308 2912 eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2308 2912 eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\5E36.tmp"C:\Users\Admin\AppData\Local\Temp\5E36.tmp" --splashC:\Users\Admin\AppData\Local\Temp\eb361d178f1ac83518ffe59104f3e9bd_JaffaCakes118.exe A3C42B9D1DC3F688DE74C8D9EB50EF9C457FB00C5738C8AEF1135B2711CC3EC84D01F1754210BE0420ACECA251E3F7DBE814FCC285382D0954D7E8FE4579F0822⤵
- Deletes itself
- Executes dropped EXE
PID:2308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5e0f47f4899ec86f376da1d11717a209f
SHA1117943291759e19acedc942b4ac77e6310eef0ca
SHA256b1d44c6c8eb1e5dd569bc73009616fb79aa87800485ad3a8942f24a36d089487
SHA5124054955bddbb75d0c0205cac0a2dd7623c1900728f484004d6e5d00ff79bea3114e60f69e332d222d9d344a50f854155355aeab3e62bdf9f7d44636e8c6d8574