Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe
-
Size
6.2MB
-
MD5
ff19c1da18a87b195d216e098fd45f7d
-
SHA1
39a2c2fcf655ea0ae05214a7caa75fa48ee58764
-
SHA256
42ffc4030d34d874865254159034b7cc68074e3ce9f2827626d1951c5dc3ea9d
-
SHA512
4669e3ba063f2cafcc19a426b9d7cb9e969c1c6d3ef91577c18ea720c6ef443d2164f993712ae79f4b2ec94dabec6289675eade2ff8609e741fc1373d7054d28
-
SSDEEP
98304:EcKGTf6NuxGTf65f6wGTf65f66iGTf65f6wGTf6+:Ezk4+4j4++
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3448 deb.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3448 deb.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3448 deb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3448 deb.exe 3448 deb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3448 3024 ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe 87 PID 3024 wrote to memory of 3448 3024 ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe 87 PID 3024 wrote to memory of 3448 3024 ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\deb.exeC:\Users\Admin\AppData\Local\Temp\deb.exe -run C:\Users\Admin\AppData\Local\Temp\ff19c1da18a87b195d216e098fd45f7d_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3448
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD577820c2ca7cf24e2b42f0ce64b8169f2
SHA1fb60c20f1e066d930ecce00f149308a5a00f3172
SHA256e30e4fbc21951ae7b8d949794685043b5b2a526e4a95b25cdd7518173feb587b
SHA5124ef7c87c21357dc0c08956664e5865e1bab28b4ede104aba0176b4115049495982d2b978493f911c7eaac0786215b9dd1d927ba8fa787fb663f6af739c989dfd