Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe
-
Size
82KB
-
MD5
ebc42e6aeb6300a2fe1affeaecf2585e
-
SHA1
a25de23975ab040c23b71db8ec1ca16c73b7c098
-
SHA256
57c15011f1376aae0e9ce69444c9b237297ea667d44ef2ad493b404879dc42b5
-
SHA512
7ba3f7ca1992b564db0259f067dc6a19909c96fc22a12dd47c3db499c0ac9132aadd678f1c0cf07740e4c8b6448caf9e70604c0cd39456ccdc20c0dbf868d31d
-
SSDEEP
1536:b07wsa4SKD11KwfdGSLxQ2HiU3vdIXXmuxl9UxCalnOIGvPKS:Q71pD1YwVGSL3HP31fuxlgCalnOIESS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5076 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5076 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe 2320 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 2320 5076 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe 91 PID 5076 wrote to memory of 2320 5076 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe 91 PID 5076 wrote to memory of 2320 5076 ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ebc42e6aeb6300a2fe1affeaecf2585e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:1592
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD53b0ae9fd8f6d61538e684d565d27ca35
SHA171bb7bd989364497158d8e17228650baa26d1d92
SHA2563b6292b1ec7d1471b37c56123a7699e33fc07934ba922a8f664bb0bd69f51f16
SHA51245967ffc5ef0ef63d818a171977f6d9bdf3432cef35917ea8423934e491ec56bcbf283004d0f39b090640af7d7c8203796521d9c02d0295469e28007aaddd01d