Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 00:42

General

  • Target

    efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    efe7089b555c5251b9ed5282b2a398c6

  • SHA1

    ce40ef5e347e024a7bb0f982a9477915545f82d2

  • SHA256

    df28ef859f088a7eda05630390e17795e10c0c90e03629fe6a8162b29e84115f

  • SHA512

    799a7792ae83f3167cdca6a20d117c715094a895069b6f9ab439362b7e8577ab3982eeb84bfc19a01d8113b2d49360b5cb280597076d3e4155aa7fa128c38205

  • SSDEEP

    49152:Qoa1taC070dTLjydPRrlKGg9mMgmkVcRq:Qoa1taC0qjARBuIMgm+c4

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Local\Temp\389D.tmp
      "C:\Users\Admin\AppData\Local\Temp\389D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\efe7089b555c5251b9ed5282b2a398c6_JaffaCakes118.exe E8FE68FC65219BBE5D948A1BD97D3460CF3A03C51B824F2512292A922ED3D1B5108FF633639E7F7107A064B1EFB45BC9EB887019AB14C5C3BD891B8AA202B7C4
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2132

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\389D.tmp

    Filesize

    1.9MB

    MD5

    92c2e64ddaa8da9c8689d4eed21720c0

    SHA1

    496020afc4150cfbd81e5f3834e4a765a9aa55da

    SHA256

    bdcd67eace0e48e3c2b067135293bae07bf41561de6adc530c9546ec54e41599

    SHA512

    6c48708b505f604dccd0e18128ef2f3e51f45013956d04120c8a86f52d1e11923c5748d50a2d12a7c8973712765e46edbe3248fb58c37aa5ee16d59f5a0d5f1b

  • memory/688-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2132-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB