Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fa84c0b18eb70b51587341f7cbca95ae
-
SHA1
9a458a38c040820a20233719885a6057d08ad29b
-
SHA256
acf728759aec66fa4c6dc402d9aac817d0d82f4df946a461ea490f68d1fad931
-
SHA512
0574604a7ca7502f63bc098ea3f2b0455d570244615e5913231eec71c273ab506203bcfb56e265138cd4eeae166a0b810c3796a925357ec9ba9830204ca964ae
-
SSDEEP
49152:Qoa1taC070dq7IbGPXnqAam24Gy5xRNIL:Qoa1taC0UbGP3F4yzRNK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3016 D77B.tmp -
Executes dropped EXE 1 IoCs
pid Process 3016 D77B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2140 fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 3016 2140 fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe 28 PID 2140 wrote to memory of 3016 2140 fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe 28 PID 2140 wrote to memory of 3016 2140 fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe 28 PID 2140 wrote to memory of 3016 2140 fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\D77B.tmp"C:\Users\Admin\AppData\Local\Temp\D77B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fa84c0b18eb70b51587341f7cbca95ae_JaffaCakes118.exe 0B988F155CE6FA386FE419D635F2AEBB2C5AEBBCBDFA22DC266054E2C790AF8BCED0D67900A7C4BC8F6A5F9382984EB48F98A97A511F06BC2A078E5FF93916542⤵
- Deletes itself
- Executes dropped EXE
PID:3016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56870836023b6e5b97c8482939e30131c
SHA19c16b85d6a26421bd961d897252a85d81989fbbc
SHA2566961c4baf91848cae4806e7974c97c42d302793a21dc3e8ea6ae531741da608b
SHA5128b66584d2dae61108687246ece0cb27e738586dad549b10f7f59c35f257dc5d1ef16445f779495240b5c25114022e332a8b20ded92047042000d6782221a0513