Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 01:42
Behavioral task
behavioral1
Sample
f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
f265da3f3a73dc1c0cc27656ea39c2b6
-
SHA1
9b9a8a7da4be3440adc8f76436abc892089d5974
-
SHA256
f63e6f89769d314463ae750d2abd10b112e0e94b65bc3460b64ffbef2bbf0ce1
-
SHA512
4a1c57dad05ed8a5d4858c86aca13cf0f7a69d698d6c0e04a514afb5859200c012a89d12366b49b9437e79dce89a552f4ae150af0ce47455c5ca6e27b319f5ab
-
SSDEEP
24576:TM7Na8fy6YqAKNja9XuH0ZZEwoqGnCdmJqzlONEspLjX9bGDT7vG:TM7Njyv2Nj4ZoqGumJMONE+jJGD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2172 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1728-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000b0000000121e6-11.dat upx behavioral1/memory/2172-17-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe 2172 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2172 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2172 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2172 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2172 1728 f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f265da3f3a73dc1c0cc27656ea39c2b6_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cc4bf2a7bbbe0a166f321f3e5e135353
SHA16dd3c62e477a251a3ce158bafa22d6d44605e11b
SHA256572c8de3baf705021d253a0f35b54781ff298ee465c0680b81faed5d02a20521
SHA512d65d388696b8a8b1001b80981d2b830f03f8668f5c7636b3ecc77612463ba7daf3056f4d46ee0e80b937dd130431c41efe4f5d04949e1f625ccd76e8fda3d062