Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
ff0b03b4167c7c78eb3208d957c28bd9
-
SHA1
67729777ed198001379c193d02aa17ce21ef4249
-
SHA256
b1b3951d08aa91d130f7faa053ceb2dc4f8c38ab4c93b03c80dc2bc9614e29d3
-
SHA512
66e11bcd98f2f9987e83d24df1085b06f05cd3835ee9a74737b171cfb3bbea9e8a7716f07f42eb0820cc2a2ac5217e5cf12353610e059659c81a58b5baf0f9cf
-
SSDEEP
49152:Qoa1taC070d3QS17yHdwZ0ibmGurHfZy+Vk3lpjSHRAPN3:Qoa1taC09o8dwpgrH7Cp2Qx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 1239.tmp -
Executes dropped EXE 1 IoCs
pid Process 2956 1239.tmp -
Loads dropped DLL 1 IoCs
pid Process 2040 ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2956 2040 ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2956 2040 ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2956 2040 ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2956 2040 ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe D591CF6B90C0179CEFC9267CAFBAE9880B7B5B34DDB58F6A1B66A77CD30C02E6B716E6AA1082065C8507DC89FD815190DAE28F19E7504B0935769D535BF12D5D2⤵
- Deletes itself
- Executes dropped EXE
PID:2956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5996176c2218cadd601c343231844a9b9
SHA1ef20cad0b8283d10837848151256871f5d6d97d6
SHA256bf4418b158ccc9a0b47832b7b3261d41b9fbf41b0e1e6f25dd8bb296c382d929
SHA512c551e356947efcc96f8500a9fa73275007b8c5064a3146d5189d5f673810f4a308404fa82338598f385974b119d01ae7b3c6a2d4a41129ff481ea927b66de75f