Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 14:25
Behavioral task
behavioral1
Sample
f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
f145cd2691d9ced4d19709e1b815869d
-
SHA1
e4fbf22390cc9cf5d9c2802a94589732c29d1835
-
SHA256
3869039a1c3c4fa6e63325a391ee6233efb5743b358850e943dcbf95c9fd2e72
-
SHA512
2050da2d4627fe126524288aea70c778cb86e53f680a2e6e8587866f8e885e9024ef12277bd03d60a4454144587741120067b19e125525111690e823db473fed
-
SSDEEP
24576:Ohfvz8ukzfgs4VyFHxV6jCUXykzub7PRKLgZgM9ueCeA+1mvG:ORb5kzfghmSXyksJKEnQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4992 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2528-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000500000002326f-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2528 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2528 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe 4992 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4992 2528 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe 86 PID 2528 wrote to memory of 4992 2528 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe 86 PID 2528 wrote to memory of 4992 2528 f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f145cd2691d9ced4d19709e1b815869d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5bb8da13fd744f66743f4763c8cbf2801
SHA1069c0e56947f12c13e05201d98d24ed01449202c
SHA25643c4d3e93ee7eced02263a69ce49dd7c62e034a328277e04c1c01df2c6f69d2d
SHA5122802719edcfa5e39f55482c857518b853b3571ab453f281db2f36a6ab3ab3cb1ccc88afb684cc59e8faddaaf51bbd0493c02f4ead1f41ad81b1a7a5c28022b8c