Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
f30dad07f93c4af6f6f9b09cfbc31437
-
SHA1
8d474dcb2741c68d5d084968fcf75294cfd25234
-
SHA256
200a328133cedb0def9b104e2f03c673d93eb96b650b8de990891a54489314e6
-
SHA512
40052f6203a9bc917968af65157be36c5b7ff5ace3928cf90570c99c91d41dc30b44afd28cb25541f4a3c4d9dee509320d7209fa2aa1311a32e392445a566b51
-
SSDEEP
49152:Qoa1taC070duVJZCOCQBnc1Giz9zUQM0+ho:Qoa1taC09VJZdTncIa9zU90j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1808 A0F.tmp -
Executes dropped EXE 1 IoCs
pid Process 1808 A0F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2212 f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1808 2212 f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe 28 PID 2212 wrote to memory of 1808 2212 f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe 28 PID 2212 wrote to memory of 1808 2212 f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe 28 PID 2212 wrote to memory of 1808 2212 f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\A0F.tmp"C:\Users\Admin\AppData\Local\Temp\A0F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\f30dad07f93c4af6f6f9b09cfbc31437_JaffaCakes118.exe E3A663DE2330D5E5C33DCAC0C829FDF832019834C0E3EBE98AF1B9640B904904731063089D2EF3BCD3719AD0C4F5448E0F6AF0D4D92A40E156C66EB01F59D0332⤵
- Deletes itself
- Executes dropped EXE
PID:1808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51010004cd3a33bfbfaeb5641c9394e13
SHA13ab5b9052c4d40916c51aef9490229c4ca6dd336
SHA256a4de4f587e03232a01acbde35390cf049e9fdbb2d932a884867331ffb2b2787a
SHA5122be3e1b7f08203aebade7ab410e6f33f2dced5e1a400d6c13e1adf36de17a2c692b64e75a6c5810424ba7d82793c7fca4c73f8d79400b9c5929edf3731969867