Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe
-
Size
281KB
-
MD5
eba61e1580f46a700f43dca23ec9b8c8
-
SHA1
670defd2e3a408039f934f7fdb18ea7ce5f6823d
-
SHA256
97eab582ab5c97d6976efebedcd046e397427bdd04defcfe9fb65afa31c9a48f
-
SHA512
8521cb69bd157ac7d7cac800738ef7b1f36b6b83315dce4484aead57a02ba66b1dc9066d2b5d034e7fc71e2f57b7d0f2f2d3efed2c2a5eca300f2287cb2c9212
-
SSDEEP
6144:bmQ8Ufw/M/eUfTWOP9uo51oe1jfohAjLdO9E1vO/hD3lMKsZG1JR:rw/lUb7oeCovO/ZVM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2632 svohst.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2444 2912 eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe 29 PID 2912 wrote to memory of 2444 2912 eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe 29 PID 2912 wrote to memory of 2444 2912 eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe 29 PID 2912 wrote to memory of 2444 2912 eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eba61e1580f46a700f43dca23ec9b8c8_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
PID:2444
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2632
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5477a3ca959604cc4e7f537b153262b66
SHA1be2fff77fe0915a23291d364aaa395498291bc08
SHA25606d295c82b3b79c3c3d35f6c0d0859b2a8286f0ab90b6de29b299eef7943d62e
SHA512cce3bd94209f7044db478f479e83b993206ca69b9aed9f53d2da155425584baa92c3fb5acf9c455aa7fbd42447383ead52a1b1b198cdd156aa26b6b1c13d588f
-
Filesize
281KB
MD5eba61e1580f46a700f43dca23ec9b8c8
SHA1670defd2e3a408039f934f7fdb18ea7ce5f6823d
SHA25697eab582ab5c97d6976efebedcd046e397427bdd04defcfe9fb65afa31c9a48f
SHA5128521cb69bd157ac7d7cac800738ef7b1f36b6b83315dce4484aead57a02ba66b1dc9066d2b5d034e7fc71e2f57b7d0f2f2d3efed2c2a5eca300f2287cb2c9212