Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe
-
Size
169KB
-
MD5
ed91b7b93d47a0d89ea3b2feda1f37ea
-
SHA1
e5c39bc7ebeb05bad870ba62571bae7f84d5bc8b
-
SHA256
4cea7bd2a825a7154a645703772dd41e550c5db6e2f3692221efaa6ef8de9fc5
-
SHA512
d8c3354e7ffa7933694d841070b7a548498f9dd46a70669ae56b03ead12b0c9897c40780fa29c919eb4c222db686c97867726bfe7366c8e1412fcf5c30719bb1
-
SSDEEP
3072:81LPzZdJEPHiQWkaTHBietI4kOe7V4OE1LiOl8g3Sg8Pc96:8Vz3JuHXoBjttkOe7VRE1LiHq16c96
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28 PID 2400 wrote to memory of 2028 2400 ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ed91b7b93d47a0d89ea3b2feda1f37ea_JaffaCakes118.exe2⤵PID:2028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD596cb7b9347f82891cf0838c78269722d
SHA1ddb8f1fef7c70b7d949936bc6154dbff197e9299
SHA256307395f7e672aed7b1556ad4f6a396bc7b48d4e43238c5b008d481e4a367fb16
SHA5122e4bd8f0c2054e2b19179c924bcf4fe4b1445fca03494ac78a26746b39eb46cf433005a8f5128f9f8bbe5af6c61d3f1a6bcd820f4c1a6f2d8e137c38dd8b163b