Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe
-
Size
237KB
-
MD5
f2e1c192c412aa3ca221b366b3b610aa
-
SHA1
b3f033a0c98d283178f856c3d2780a992fdca194
-
SHA256
dfd7b02685603bb55ce570fe7c25d0b593e094cfdae6cfa52c75cbf941d8cd7c
-
SHA512
1c790647199cd31efe164ae5a08ccfedb272689d0b743bf1b2a1f6393ebf025be2e151175e53e92f9c9fa90dbf8ba6aa0675d770a4712c64c0395e60061c3e70
-
SSDEEP
3072:umPWUitOGy3owSFz4yQY1QxaYR+yCfzjCGZfup2e/kiA0ofI4HJMLjFDLUyaDQYQ:FhwwYPKAYrCnDZf8k0r4glLjHr5/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4292 X -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 X 4292 X -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3616 wrote to memory of 4576 3616 f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe 85 PID 3616 wrote to memory of 4576 3616 f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe 85 PID 3616 wrote to memory of 4576 3616 f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe 85 PID 3616 wrote to memory of 4576 3616 f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe 85 PID 3616 wrote to memory of 4292 3616 f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe 86 PID 3616 wrote to memory of 4292 3616 f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe 86 PID 4292 wrote to memory of 3388 4292 X 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2e1c192c412aa3ca221b366b3b610aa_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\explorer.exe000001C8*3⤵PID:4576
-
-
C:\Users\Admin\AppData\Local\98be3bf7\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64