Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe
-
Size
82KB
-
MD5
f641873cab10ac6e1e4dfdb177fac44b
-
SHA1
fedbac3ae3f9ae83d34728de7873d7a85ece225e
-
SHA256
597d190e9cdd079c2b4f9f5d83ff16bf67efb0e8f7e827ad445e72aeeae64073
-
SHA512
1226ccd5155f6683a30ece47c72dbdc26a49cca794d39558f9121d695280da30f616e2b392930ea1327e6367a2d8d9b7b3adb1dc4c214caa8dc5f65b607e99ff
-
SSDEEP
1536:rzKPeHxeoO3V2jzNrijXi0trcgzQd85alsMqu8bpIvDeBt41Ikwj4v:pYYXN+jXiUrUu5aWMq5AeWeg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2904 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe 2904 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2904 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe 29 PID 1404 wrote to memory of 2904 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe 29 PID 1404 wrote to memory of 2904 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe 29 PID 1404 wrote to memory of 2904 1404 f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f641873cab10ac6e1e4dfdb177fac44b_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2904
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD562206f16840ae586f6f88d5b36fe39aa
SHA19b9860f5e417855fd9518e74de09f25075cef05e
SHA256c3456bda1bcfc0144e152635e81ea8e5c8e16754db47c32cf337696ec5059a70
SHA512b184753bc703eebf84ca43cf102f0d6af2bc7fc413291b8ac701a9b2280ca4787e64ae3730684fb8a79f29b1a0e326fbf1ec2d14d9c0560b2d8eb53f5b895145