Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
fe63c64281286f81fd17a47190041257_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe63c64281286f81fd17a47190041257_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe63c64281286f81fd17a47190041257_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fe63c64281286f81fd17a47190041257
-
SHA1
750032e6b04f22d3aaf2f4d4786690f88ba804c5
-
SHA256
5994ba8972dd09f39722e5e0f8d76b2d7b5bad00aa7682dc17d9eea4aadfac72
-
SHA512
96ccb426d2f73bf17dcd709edb65588b3de37242d7da6e71aa69101b6c366d86461a4bc73ac76ca1799290f536757971e5aa79af1f0690dd0610cdc2d7da768c
-
SSDEEP
49152:Qoa1taC070dEZhuykF3hvtHChYW5LyA+cQEOh5R:Qoa1taC0NhCChN0Zc56b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2200 FE8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2200 FE8.tmp -
Loads dropped DLL 1 IoCs
pid Process 2944 fe63c64281286f81fd17a47190041257_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2200 2944 fe63c64281286f81fd17a47190041257_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2200 2944 fe63c64281286f81fd17a47190041257_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2200 2944 fe63c64281286f81fd17a47190041257_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2200 2944 fe63c64281286f81fd17a47190041257_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe63c64281286f81fd17a47190041257_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe63c64281286f81fd17a47190041257_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\FE8.tmp"C:\Users\Admin\AppData\Local\Temp\FE8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fe63c64281286f81fd17a47190041257_JaffaCakes118.exe 84B3E88ECC164F486284C8BCC5D56CBF1BD3F28AFE546F7AC2F2D3BBB7C1F3E6D5EDEA27E521DFDB2115C9DD0FCF84AFEAF1700722B5B3FE4364688B020FB2C32⤵
- Deletes itself
- Executes dropped EXE
PID:2200
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54981f88d85a34db55cf519868bab23f5
SHA1861e40d8f027103adb05e646d6328a643c05b3cf
SHA256d9c4c1b6fd03494e108f58341faa6500ad0ccb392026b68f029049f5876db7f8
SHA5129ba8007d3c8ab797fea89470e0d3badfcfb14774e9b6cdd5668e651db9c6888d4d23e94ad80e32fddd2296b1cb2256a3f95c5ca3aaaf03ce9158eca51c539db2