Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
ee1ec841983e28a2f7da33a189a89124_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee1ec841983e28a2f7da33a189a89124_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ee1ec841983e28a2f7da33a189a89124_JaffaCakes118.exe
-
Size
15KB
-
MD5
ee1ec841983e28a2f7da33a189a89124
-
SHA1
3c6bdf64d05d6824dd60391bd041e75ea1c6b48d
-
SHA256
b6060ab9a84b6142511ff06565a681f4f16c20924f1ca46089f37ee18f44e6be
-
SHA512
11e204a23a8d69feb5921d928ea47c1d3a8c7db3d114005584d656d2305a8ce6af3af73ab1a836b74978c0704ef23e4cc0c334a857e6bcf183e3eb7d1d6ae1ba
-
SSDEEP
192:9iIRC3BrWVWkytDZtEXwY0D61UpFyWBxQ1eHcubO0qbYkcEjEma:9ih3BrW4tDW+EEcWBt8kOLj
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2068-0-0x0000000007000000-0x000000000700A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ee1ec841983e28a2f7da33a189a89124_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\fj7cws3qe1 = "C:\\Users\\Admin\\fj7cws3qe1.exe" ee1ec841983e28a2f7da33a189a89124_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2068-0-0x0000000007000000-0x000000000700A000-memory.dmpFilesize
40KB
-
memory/2068-1-0x000000000B000000-0x000000000B007000-memory.dmpFilesize
28KB
-
memory/2068-3-0x000000000B000000-0x000000000B007000-memory.dmpFilesize
28KB
-
memory/2068-4-0x000000000B000000-0x000000000B007000-memory.dmpFilesize
28KB