Analysis
-
max time kernel
141s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe
-
Size
82KB
-
MD5
fa8c885a9b4223f684f9125a1d864c40
-
SHA1
3219f0ab7b7dc17604b4883b47dc17fe4c7afcf5
-
SHA256
37311828fb366ca20797b593add8507c2f42c8e523359acc781b6c162fdf9355
-
SHA512
d6adff2629cb8c0fe62948eb9df459335034d2c3dddd9609f9cf0827ddfe8b2b3004989b3ca97df323f2715e84a19800919eec90e948b6319e2420596d370f64
-
SSDEEP
1536:3FjOMumDFlnsQnuoWtcY1iTIZW6F/i3fQa3ltJID3kq9EPY4:3h8Suo2NxmfQktJI4q9Ez
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3960 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3960 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4660 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4660 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe 3960 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3960 4660 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe 85 PID 4660 wrote to memory of 3960 4660 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe 85 PID 4660 wrote to memory of 3960 4660 fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fa8c885a9b4223f684f9125a1d864c40_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5baaa4c16eea8debff388b0ce32b527aa
SHA14fc9cbd07044d1db5136663566b94907458c5fd3
SHA25670714786dc5bcb2f0bcee6f5ad32229ce60afa4b15b139380d216c6b3eb35b18
SHA512e4c4ca06cf94b02e96a39eddcd6a6fc7a1a1ee56a4c3e8231200267d61b599506a4dfc89baa1c89425cc177d5abd4df0464f9be7c53b69dfa493d15205af9f8b