Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe
-
Size
82KB
-
MD5
f901471bcd9de7cdd1b73bc529c2c054
-
SHA1
8036a52afdba791bb7a98aaddc07306127d27a6f
-
SHA256
df8e31640b84ec9fe92c87ea2ebed3dfc535f753774b3c2eb6b23735c1ab4128
-
SHA512
f05de4fcdbd3c240c73cf9bc3239c7106209441636ffa07a227e135a872709ad5707b07dd243a7f098c31e48d0a23bb6d053ed1ad1a01a0b66544dc61cc7e481
-
SSDEEP
1536:wOT19KASi8+LHXnQsFWjLCy6CudXj/CZAqjHewfCDJiM4xtG4:wOh2qQsry6CudXj/CxjHewMJextG4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2264 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4900 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4900 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 2264 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2264 4900 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 88 PID 4900 wrote to memory of 2264 4900 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 88 PID 4900 wrote to memory of 2264 4900 f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f901471bcd9de7cdd1b73bc529c2c054_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2264
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54fe1c4b2ad74fb082ca88bfd511c7df7
SHA12b982d6fde6c5ec389020dc3a26fc760cc6accc0
SHA25662e4dd332fc02cab34e34628b8e3b79f9670835b7acbcd6f70cc36365b5b8ecd
SHA512d80835f72af2c9e00802ba1e0bf97758ccb924915cda8d23b1c997a0c6eada37608886c263d68f602411d581fcd7b711fa6a868856120610960a85854b9bc5fa