Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe
-
Size
82KB
-
MD5
f06fd59c6eb4fd2d21b35785210842ab
-
SHA1
99dd05fc00e64abb5ca9d79dac46f7ab9ff2b8b6
-
SHA256
fcc326df6bd3f78c81bef2ae786d196b15dd72531b609a5798f342ecfb521d38
-
SHA512
8e84e21b982ad084899f8babd0401da1e718f66b7da5027c25b852987cc18066404663128b2b2b658ecd6a1056c105493b4cff7f62f8b109ea35c1083751a46a
-
SSDEEP
1536:UhA890wtiSxPAXmjBTilTfeoAkVrITqEYOtQmjZBfE6sNMI52LTK/wSLWcH6z:e9QSGXmjBTeJV5OtlDfE6xxLTK//K66z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 452 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 452 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2520 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2520 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe 452 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2520 wrote to memory of 452 2520 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe 85 PID 2520 wrote to memory of 452 2520 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe 85 PID 2520 wrote to memory of 452 2520 f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f06fd59c6eb4fd2d21b35785210842ab_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:452
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5555ae1db146d2355ebb9e6fa76537f0f
SHA11efca58820c95084748bc0dd4fc38c121a3b6061
SHA2566ef374ebb4a825fdedc57329b1a20045754b31d7517d98da2b4f871602d3f74c
SHA5127a3c1214395e899e295b42ed643f565f69775e769640c3a4590612a62e1df622936c351632b245fb33846d6fc7c3d2d54a1305b2ebc6407713fdcd66c7e87740