Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
efe7089b555c5251b9ed5282b2a398c6
-
SHA1
ce40ef5e347e024a7bb0f982a9477915545f82d2
-
SHA256
df28ef859f088a7eda05630390e17795e10c0c90e03629fe6a8162b29e84115f
-
SHA512
799a7792ae83f3167cdca6a20d117c715094a895069b6f9ab439362b7e8577ab3982eeb84bfc19a01d8113b2d49360b5cb280597076d3e4155aa7fa128c38205
-
SSDEEP
49152:Qoa1taC070dTLjydPRrlKGg9mMgmkVcRq:Qoa1taC0qjARBuIMgm+c4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 389D.tmp -
Executes dropped EXE 1 IoCs
pid Process 2132 389D.tmp -
Loads dropped DLL 1 IoCs
pid Process 688 efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 688 wrote to memory of 2132 688 efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe 28 PID 688 wrote to memory of 2132 688 efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe 28 PID 688 wrote to memory of 2132 688 efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe 28 PID 688 wrote to memory of 2132 688 efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\389D.tmp"C:\Users\Admin\AppData\Local\Temp\389D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe E8FE68FC65219BBE5D948A1BD97D3460CF3A03C51B824F2512292A922ED3D1B5108FF633639E7F7107A064B1EFB45BC9EB887019AB14C5C3BD891B8AA202B7C42⤵
- Deletes itself
- Executes dropped EXE
PID:2132
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD592c2e64ddaa8da9c8689d4eed21720c0
SHA1496020afc4150cfbd81e5f3834e4a765a9aa55da
SHA256bdcd67eace0e48e3c2b067135293bae07bf41561de6adc530c9546ec54e41599
SHA5126c48708b505f604dccd0e18128ef2f3e51f45013956d04120c8a86f52d1e11923c5748d50a2d12a7c8973712765e46edbe3248fb58c37aa5ee16d59f5a0d5f1b