Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 15:56
Behavioral task
behavioral1
Sample
f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
f16fee67c23f0725f2b9d6431ccefa7f
-
SHA1
5be935da886de0e461ff86acc76403b7701ac74d
-
SHA256
535e243548c19cf977df370844825dad9e4226170ebc11bce61de6272df7a1d2
-
SHA512
20ffcd1dd164f55b8629711ed5bd871fab676ae9ab88e4e3e93d8691b4c2d2d852ff0035dd43c66b3d7d34516b78622cf576b54995a9c40a505c3784a7164f29
-
SSDEEP
24576:e6MSKcCoLT5LvV5aL4yj27gTZdizmeJDBi/9a2fJ/AckOhQadQ8B4/OWCU9/9Us:49ovNVLy68dsyst4BZ6o6OkR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4844 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4844 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/660-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000300000001e97a-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 660 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 660 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe 4844 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 660 wrote to memory of 4844 660 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe 87 PID 660 wrote to memory of 4844 660 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe 87 PID 660 wrote to memory of 4844 660 f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f16fee67c23f0725f2b9d6431ccefa7f_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e502434aefe3a1a1352e5a81e9c71151
SHA174b97e864d0c77af10e252b8b5ac4903bc9476d3
SHA256b4f7ea3a1620623780073f09508ce6ff2d4aef8cc4839492424e09059e0d9e63
SHA5124a5777fd6ec5c390fc94c82d7d11b013f2b802c06581b8fc06f5af5080c467f9f058cb624d7033726ee684f51723e52c97873c3e7dd4fa46587ac2ae7bdce984