Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fe100933ce73b34723ea5f48a35a2547
-
SHA1
89497e494e332ed94dffe23dde6217ff4e43ae71
-
SHA256
de1888c8a05570a5ef225dc5c197b846d688ae41ad914365506caa2731573272
-
SHA512
ae73dfe84adb0f00047eeff37e298730e51ddfcaaf119d48044c72b1ccc0dff04507cf5111eeeb5bc7f6e5411fd268339ab0468bf11e297faa876595b40c4e99
-
SSDEEP
49152:Qoa1taC070d6hnryxBBOHmhXEbgQHi21ZW:Qoa1taC0zhE3OHmFToD7W
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 93A8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2760 93A8.tmp -
Loads dropped DLL 1 IoCs
pid Process 1308 fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2760 1308 fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe 28 PID 1308 wrote to memory of 2760 1308 fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe 28 PID 1308 wrote to memory of 2760 1308 fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe 28 PID 1308 wrote to memory of 2760 1308 fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\93A8.tmp"C:\Users\Admin\AppData\Local\Temp\93A8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fe100933ce73b34723ea5f48a35a2547_JaffaCakes118.exe 640F428645CCA55CFA26EF66D2A1769D8C0C535EE6A284A7CA2BBCD7FB26EB2F02D395CF77DD9FB38F55BEB91539C0C835FE03E0EFB5D06E92B6E7FA9E8D36F22⤵
- Deletes itself
- Executes dropped EXE
PID:2760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD58e53ba139c1eb12781ba07b907b836f6
SHA1b09f65a35cf52407d12394bb4008c9969175ec49
SHA2565bdbb490ed97aa47f5e0eeb20c9beec51b3910aebdae63d44c68f4a91e08d9d6
SHA512fe1064c36cb343e24fb7903d495f81290a76cd28de5e86203fb3e88fd098aaf853a397536d27f21d047dc9db1b50adaed476bda9bfbe1b5fc8ed1812af339fd6