Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe
-
Size
82KB
-
MD5
f901471bcd9de7cdd1b73bc529c2c054
-
SHA1
8036a52afdba791bb7a98aaddc07306127d27a6f
-
SHA256
df8e31640b84ec9fe92c87ea2ebed3dfc535f753774b3c2eb6b23735c1ab4128
-
SHA512
f05de4fcdbd3c240c73cf9bc3239c7106209441636ffa07a227e135a872709ad5707b07dd243a7f098c31e48d0a23bb6d053ed1ad1a01a0b66544dc61cc7e481
-
SSDEEP
1536:wOT19KASi8+LHXnQsFWjLCy6CudXj/CZAqjHewfCDJiM4xtG4:wOh2qQsry6CudXj/CxjHewMJextG4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1368 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 1368 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1368 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 29 PID 2220 wrote to memory of 1368 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 29 PID 2220 wrote to memory of 1368 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 29 PID 2220 wrote to memory of 1368 2220 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5a26181624e09f5a3cf0e024a90745b4a
SHA1baaad740d4f3485ec5c0e1e3830ec5450779fbe0
SHA25637084e30f3813ca620cae41208776525b8472848f6cc4e9c82be1e6be845f1cf
SHA5124ea8d7c7eab96b2d259e9dde0bffa80297f579275ba721612e5fb9552e69a6b4107d9d02ce71844e17380efd8c450cc9034cb10b34ba36d91be6558bc5f3d32b