Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 10:10

General

  • Target

    ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    ff0b03b4167c7c78eb3208d957c28bd9

  • SHA1

    67729777ed198001379c193d02aa17ce21ef4249

  • SHA256

    b1b3951d08aa91d130f7faa053ceb2dc4f8c38ab4c93b03c80dc2bc9614e29d3

  • SHA512

    66e11bcd98f2f9987e83d24df1085b06f05cd3835ee9a74737b171cfb3bbea9e8a7716f07f42eb0820cc2a2ac5217e5cf12353610e059659c81a58b5baf0f9cf

  • SSDEEP

    49152:Qoa1taC070d3QS17yHdwZ0ibmGurHfZy+Vk3lpjSHRAPN3:Qoa1taC09o8dwpgrH7Cp2Qx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\1239.tmp
      "C:\Users\Admin\AppData\Local\Temp\1239.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe D591CF6B90C0179CEFC9267CAFBAE9880B7B5B34DDB58F6A1B66A77CD30C02E6B716E6AA1082065C8507DC89FD815190DAE28F19E7504B0935769D535BF12D5D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1239.tmp

    Filesize

    1.9MB

    MD5

    996176c2218cadd601c343231844a9b9

    SHA1

    ef20cad0b8283d10837848151256871f5d6d97d6

    SHA256

    bf4418b158ccc9a0b47832b7b3261d41b9fbf41b0e1e6f25dd8bb296c382d929

    SHA512

    c551e356947efcc96f8500a9fa73275007b8c5064a3146d5189d5f673810f4a308404fa82338598f385974b119d01ae7b3c6a2d4a41129ff481ea927b66de75f

  • memory/2040-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2956-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB