Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 12:13
Behavioral task
behavioral1
Sample
f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
f1070b18b2f1c6e723cfcee43706f642
-
SHA1
09b4fc6c8c36bfb6dbc0179009678a34f0388f19
-
SHA256
a4339751eaf56f8e9b65119a7b2b5ef53c663523184e0e8b4d719721dbea6c71
-
SHA512
05311533b8de3e0c3afa44d6218ca6e55ef8927b00de6841db138051787f29c82950d9213703d44854489e261bc5b0e02f90100552466cfed3f6f548496c1a38
-
SSDEEP
24576:oWGmakcorBGOMOoO569sCWZQknasaf+Fu4gIloi5oLX95sPQMGwqF2yGIDKHaQQW:lGytrBPFoO569Cak/aWFBF5oDzs1Gwqj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2372 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3064-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012330-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe 2372 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2372 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe 28 PID 3064 wrote to memory of 2372 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe 28 PID 3064 wrote to memory of 2372 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe 28 PID 3064 wrote to memory of 2372 3064 f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f1070b18b2f1c6e723cfcee43706f642_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD502cf2d7d63fde3354bc5513c9caca7fc
SHA15b9d0e0ed1b41b17403888aab198c1312eacf749
SHA256bbaba86c44e8e2e6b84bc839d816367da3ff0ac3084fcbbfd3776323fc898cf3
SHA5123fefd938f9c1f229b740ef0100d94c53391f09ea0b0aec6d1aebaec904574fe9d736f22c303d6ca741d475ef78c53b3ddc8e092913f94098b5d260bb6967d8e3