Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 10:10

General

  • Target

    ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    ff0b03b4167c7c78eb3208d957c28bd9

  • SHA1

    67729777ed198001379c193d02aa17ce21ef4249

  • SHA256

    b1b3951d08aa91d130f7faa053ceb2dc4f8c38ab4c93b03c80dc2bc9614e29d3

  • SHA512

    66e11bcd98f2f9987e83d24df1085b06f05cd3835ee9a74737b171cfb3bbea9e8a7716f07f42eb0820cc2a2ac5217e5cf12353610e059659c81a58b5baf0f9cf

  • SSDEEP

    49152:Qoa1taC070d3QS17yHdwZ0ibmGurHfZy+Vk3lpjSHRAPN3:Qoa1taC09o8dwpgrH7Cp2Qx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\32B8.tmp
      "C:\Users\Admin\AppData\Local\Temp\32B8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ff0b03b4167c7c78eb3208d957c28bd9_JaffaCakes118.exe 0C6106B2A6A90655AB5FC8E6AAE721F5348AE9AD4982FF05D24F38019F88D7FE2CCB4E5CCDB7C4E4EEFA2DF882FC7D6469F05A2233DDD365153F75EAD8F7C010
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:5116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\32B8.tmp

    Filesize

    1.9MB

    MD5

    afa6c448295b6d6a96273dc5d08b3c23

    SHA1

    dd34a54e82558ea7a145eacb1869314187221db5

    SHA256

    19b8d393f61fc23c1177d4b62fbd99cc2d6e37cc60cddce1b51b14f4087dee48

    SHA512

    e9a4eb91a30b93bae2494a0a82eed1d98a5726f3847cb143970038c8e0674b18e453516cec18a202dd8efd7c0d8e80b5dcf49ce7dd90fc0b12fa5f5da80ea895

  • memory/952-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/5116-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB