Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 21:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe
-
Size
42KB
-
MD5
0010cf3e5fd0ee12564d3362401f7923
-
SHA1
5bc3075527bcd1b562765e4289bd8cda5f995336
-
SHA256
cb337c3be3fb831848287f3ff7c984b4b89907b9321fc88ce8642febc195d11f
-
SHA512
53a954da500bbd6c8b920bbe1da0eab175a166b2b5e4ad33715156831a72e68aed30121548dff434a523ec1f4678e613e075e39ff602b339b5b8ac1729300e3b
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRkNRdZ:nSgy19JSVO1ONn511/tivXZzOmRk1jt
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4960 rxlfxrr.exe 4912 btbttb.exe 872 5pdvd.exe 3552 rfxxrlf.exe 2076 pjdpd.exe 3304 xlrfrll.exe 4264 1lxrxrf.exe 1696 3tnbnb.exe 1508 9ppdv.exe 1532 pjdjj.exe 3556 xlxflfx.exe 4920 hbbthb.exe 3484 bnbntn.exe 4344 jjvvj.exe 4224 1lxrfxl.exe 948 9rrfxlx.exe 4596 bnbbnb.exe 3900 pjjdv.exe 2056 pdvvp.exe 2220 fxfrrlr.exe 2324 1nnhhb.exe 2308 dvvdv.exe 3888 fxfxrrr.exe 1040 bnthnb.exe 624 pjpjp.exe 1728 3vpjv.exe 1876 lffxfxr.exe 1844 ttbtbh.exe 2404 btnhnh.exe 4904 vvvvv.exe 3840 ffxrxxl.exe 3344 lrrlffx.exe 3868 nntbtt.exe 4436 jpdpp.exe 1604 pjpjj.exe 3280 lxfxrrr.exe 4552 bbbnbn.exe 3904 tbnhbb.exe 2880 pvjdp.exe 3264 5xxlrff.exe 4912 lxlflxl.exe 2668 vjjjj.exe 592 3bbnbb.exe 3348 dvpdp.exe 3912 xffrxrf.exe 3780 tttnbt.exe 428 1lxlrlx.exe 2628 tbhbtn.exe 4172 bnhtbt.exe 2924 jjvpd.exe 3176 bhbnhb.exe 436 dpvpv.exe 2516 pvjvj.exe 3888 5ffffxr.exe 2876 ttbhhn.exe 3644 djpdv.exe 4400 pjpvp.exe 3840 vjpvp.exe 4448 lrxrrrr.exe 3868 hhbnht.exe 1856 1ppdp.exe 1404 xllfrrl.exe 4960 tbbnhh.exe 3284 ntttnt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4960 1856 0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe 87 PID 1856 wrote to memory of 4960 1856 0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe 87 PID 1856 wrote to memory of 4960 1856 0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe 87 PID 4960 wrote to memory of 4912 4960 rxlfxrr.exe 89 PID 4960 wrote to memory of 4912 4960 rxlfxrr.exe 89 PID 4960 wrote to memory of 4912 4960 rxlfxrr.exe 89 PID 4912 wrote to memory of 872 4912 btbttb.exe 91 PID 4912 wrote to memory of 872 4912 btbttb.exe 91 PID 4912 wrote to memory of 872 4912 btbttb.exe 91 PID 872 wrote to memory of 3552 872 5pdvd.exe 92 PID 872 wrote to memory of 3552 872 5pdvd.exe 92 PID 872 wrote to memory of 3552 872 5pdvd.exe 92 PID 3552 wrote to memory of 2076 3552 rfxxrlf.exe 93 PID 3552 wrote to memory of 2076 3552 rfxxrlf.exe 93 PID 3552 wrote to memory of 2076 3552 rfxxrlf.exe 93 PID 2076 wrote to memory of 3304 2076 pjdpd.exe 94 PID 2076 wrote to memory of 3304 2076 pjdpd.exe 94 PID 2076 wrote to memory of 3304 2076 pjdpd.exe 94 PID 3304 wrote to memory of 4264 3304 xlrfrll.exe 95 PID 3304 wrote to memory of 4264 3304 xlrfrll.exe 95 PID 3304 wrote to memory of 4264 3304 xlrfrll.exe 95 PID 4264 wrote to memory of 1696 4264 1lxrxrf.exe 96 PID 4264 wrote to memory of 1696 4264 1lxrxrf.exe 96 PID 4264 wrote to memory of 1696 4264 1lxrxrf.exe 96 PID 1696 wrote to memory of 1508 1696 3tnbnb.exe 97 PID 1696 wrote to memory of 1508 1696 3tnbnb.exe 97 PID 1696 wrote to memory of 1508 1696 3tnbnb.exe 97 PID 1508 wrote to memory of 1532 1508 9ppdv.exe 98 PID 1508 wrote to memory of 1532 1508 9ppdv.exe 98 PID 1508 wrote to memory of 1532 1508 9ppdv.exe 98 PID 1532 wrote to memory of 3556 1532 pjdjj.exe 99 PID 1532 wrote to memory of 3556 1532 pjdjj.exe 99 PID 1532 wrote to memory of 3556 1532 pjdjj.exe 99 PID 3556 wrote to memory of 4920 3556 xlxflfx.exe 100 PID 3556 wrote to memory of 4920 3556 xlxflfx.exe 100 PID 3556 wrote to memory of 4920 3556 xlxflfx.exe 100 PID 4920 wrote to memory of 3484 4920 hbbthb.exe 101 PID 4920 wrote to memory of 3484 4920 hbbthb.exe 101 PID 4920 wrote to memory of 3484 4920 hbbthb.exe 101 PID 3484 wrote to memory of 4344 3484 bnbntn.exe 102 PID 3484 wrote to memory of 4344 3484 bnbntn.exe 102 PID 3484 wrote to memory of 4344 3484 bnbntn.exe 102 PID 4344 wrote to memory of 4224 4344 jjvvj.exe 104 PID 4344 wrote to memory of 4224 4344 jjvvj.exe 104 PID 4344 wrote to memory of 4224 4344 jjvvj.exe 104 PID 4224 wrote to memory of 948 4224 1lxrfxl.exe 105 PID 4224 wrote to memory of 948 4224 1lxrfxl.exe 105 PID 4224 wrote to memory of 948 4224 1lxrfxl.exe 105 PID 948 wrote to memory of 4596 948 9rrfxlx.exe 106 PID 948 wrote to memory of 4596 948 9rrfxlx.exe 106 PID 948 wrote to memory of 4596 948 9rrfxlx.exe 106 PID 4596 wrote to memory of 3900 4596 bnbbnb.exe 107 PID 4596 wrote to memory of 3900 4596 bnbbnb.exe 107 PID 4596 wrote to memory of 3900 4596 bnbbnb.exe 107 PID 3900 wrote to memory of 2056 3900 pjjdv.exe 108 PID 3900 wrote to memory of 2056 3900 pjjdv.exe 108 PID 3900 wrote to memory of 2056 3900 pjjdv.exe 108 PID 2056 wrote to memory of 2220 2056 pdvvp.exe 109 PID 2056 wrote to memory of 2220 2056 pdvvp.exe 109 PID 2056 wrote to memory of 2220 2056 pdvvp.exe 109 PID 2220 wrote to memory of 2324 2220 fxfrrlr.exe 110 PID 2220 wrote to memory of 2324 2220 fxfrrlr.exe 110 PID 2220 wrote to memory of 2324 2220 fxfrrlr.exe 110 PID 2324 wrote to memory of 2308 2324 1nnhhb.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0010cf3e5fd0ee12564d3362401f7923_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\rxlfxrr.exec:\rxlfxrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
\??\c:\btbttb.exec:\btbttb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\5pdvd.exec:\5pdvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\rfxxrlf.exec:\rfxxrlf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
\??\c:\pjdpd.exec:\pjdpd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\xlrfrll.exec:\xlrfrll.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\1lxrxrf.exec:\1lxrxrf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\3tnbnb.exec:\3tnbnb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\9ppdv.exec:\9ppdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\pjdjj.exec:\pjdjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\xlxflfx.exec:\xlxflfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\hbbthb.exec:\hbbthb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\bnbntn.exec:\bnbntn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
\??\c:\jjvvj.exec:\jjvvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
\??\c:\1lxrfxl.exec:\1lxrfxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\9rrfxlx.exec:\9rrfxlx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
\??\c:\bnbbnb.exec:\bnbbnb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\pjjdv.exec:\pjjdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
\??\c:\pdvvp.exec:\pdvvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\fxfrrlr.exec:\fxfrrlr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\1nnhhb.exec:\1nnhhb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\dvvdv.exec:\dvvdv.exe23⤵
- Executes dropped EXE
PID:2308 -
\??\c:\fxfxrrr.exec:\fxfxrrr.exe24⤵
- Executes dropped EXE
PID:3888 -
\??\c:\bnthnb.exec:\bnthnb.exe25⤵
- Executes dropped EXE
PID:1040 -
\??\c:\pjpjp.exec:\pjpjp.exe26⤵
- Executes dropped EXE
PID:624 -
\??\c:\3vpjv.exec:\3vpjv.exe27⤵
- Executes dropped EXE
PID:1728 -
\??\c:\lffxfxr.exec:\lffxfxr.exe28⤵
- Executes dropped EXE
PID:1876 -
\??\c:\ttbtbh.exec:\ttbtbh.exe29⤵
- Executes dropped EXE
PID:1844 -
\??\c:\btnhnh.exec:\btnhnh.exe30⤵
- Executes dropped EXE
PID:2404 -
\??\c:\vvvvv.exec:\vvvvv.exe31⤵
- Executes dropped EXE
PID:4904 -
\??\c:\ffxrxxl.exec:\ffxrxxl.exe32⤵
- Executes dropped EXE
PID:3840 -
\??\c:\lrrlffx.exec:\lrrlffx.exe33⤵
- Executes dropped EXE
PID:3344 -
\??\c:\nntbtt.exec:\nntbtt.exe34⤵
- Executes dropped EXE
PID:3868 -
\??\c:\jpdpp.exec:\jpdpp.exe35⤵
- Executes dropped EXE
PID:4436 -
\??\c:\pjpjj.exec:\pjpjj.exe36⤵
- Executes dropped EXE
PID:1604 -
\??\c:\lxfxrrr.exec:\lxfxrrr.exe37⤵
- Executes dropped EXE
PID:3280 -
\??\c:\bbbnbn.exec:\bbbnbn.exe38⤵
- Executes dropped EXE
PID:4552 -
\??\c:\tbnhbb.exec:\tbnhbb.exe39⤵
- Executes dropped EXE
PID:3904 -
\??\c:\pvjdp.exec:\pvjdp.exe40⤵
- Executes dropped EXE
PID:2880 -
\??\c:\5xxlrff.exec:\5xxlrff.exe41⤵
- Executes dropped EXE
PID:3264 -
\??\c:\lxlflxl.exec:\lxlflxl.exe42⤵
- Executes dropped EXE
PID:4912 -
\??\c:\vjjjj.exec:\vjjjj.exe43⤵
- Executes dropped EXE
PID:2668 -
\??\c:\3bbnbb.exec:\3bbnbb.exe44⤵
- Executes dropped EXE
PID:592 -
\??\c:\dvpdp.exec:\dvpdp.exe45⤵
- Executes dropped EXE
PID:3348 -
\??\c:\xffrxrf.exec:\xffrxrf.exe46⤵
- Executes dropped EXE
PID:3912 -
\??\c:\tttnbt.exec:\tttnbt.exe47⤵
- Executes dropped EXE
PID:3780 -
\??\c:\1lxlrlx.exec:\1lxlrlx.exe48⤵
- Executes dropped EXE
PID:428 -
\??\c:\tbhbtn.exec:\tbhbtn.exe49⤵
- Executes dropped EXE
PID:2628 -
\??\c:\bnhtbt.exec:\bnhtbt.exe50⤵
- Executes dropped EXE
PID:4172 -
\??\c:\jjvpd.exec:\jjvpd.exe51⤵
- Executes dropped EXE
PID:2924 -
\??\c:\bhbnhb.exec:\bhbnhb.exe52⤵
- Executes dropped EXE
PID:3176 -
\??\c:\dpvpv.exec:\dpvpv.exe53⤵
- Executes dropped EXE
PID:436 -
\??\c:\pvjvj.exec:\pvjvj.exe54⤵
- Executes dropped EXE
PID:2516 -
\??\c:\5ffffxr.exec:\5ffffxr.exe55⤵
- Executes dropped EXE
PID:3888 -
\??\c:\ttbhhn.exec:\ttbhhn.exe56⤵
- Executes dropped EXE
PID:2876 -
\??\c:\djpdv.exec:\djpdv.exe57⤵
- Executes dropped EXE
PID:3644 -
\??\c:\pjpvp.exec:\pjpvp.exe58⤵
- Executes dropped EXE
PID:4400 -
\??\c:\vjpvp.exec:\vjpvp.exe59⤵
- Executes dropped EXE
PID:3840 -
\??\c:\lrxrrrr.exec:\lrxrrrr.exe60⤵
- Executes dropped EXE
PID:4448 -
\??\c:\hhbnht.exec:\hhbnht.exe61⤵
- Executes dropped EXE
PID:3868 -
\??\c:\1ppdp.exec:\1ppdp.exe62⤵
- Executes dropped EXE
PID:1856 -
\??\c:\xllfrrl.exec:\xllfrrl.exe63⤵
- Executes dropped EXE
PID:1404 -
\??\c:\tbbnhh.exec:\tbbnhh.exe64⤵
- Executes dropped EXE
PID:4960 -
\??\c:\ntttnt.exec:\ntttnt.exe65⤵
- Executes dropped EXE
PID:3284 -
\??\c:\dvjjd.exec:\dvjjd.exe66⤵PID:4616
-
\??\c:\pjpjj.exec:\pjpjj.exe67⤵PID:4500
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe68⤵PID:2348
-
\??\c:\thnnbb.exec:\thnnbb.exe69⤵PID:2904
-
\??\c:\7nbtbn.exec:\7nbtbn.exe70⤵PID:2112
-
\??\c:\ppvpp.exec:\ppvpp.exe71⤵PID:2108
-
\??\c:\rlrffxf.exec:\rlrffxf.exe72⤵PID:3316
-
\??\c:\3xrfxrl.exec:\3xrfxrl.exe73⤵PID:2168
-
\??\c:\hhbbhn.exec:\hhbbhn.exe74⤵PID:1164
-
\??\c:\7ppdv.exec:\7ppdv.exe75⤵PID:3172
-
\??\c:\9fflrfl.exec:\9fflrfl.exe76⤵PID:3180
-
\??\c:\ntnnhb.exec:\ntnnhb.exe77⤵PID:228
-
\??\c:\nhnhhh.exec:\nhnhhh.exe78⤵PID:924
-
\??\c:\9ffrflx.exec:\9ffrflx.exe79⤵PID:2620
-
\??\c:\xlrlffx.exec:\xlrlffx.exe80⤵PID:4808
-
\??\c:\bnttnn.exec:\bnttnn.exe81⤵PID:2972
-
\??\c:\nnhbnt.exec:\nnhbnt.exe82⤵PID:1180
-
\??\c:\pjddp.exec:\pjddp.exe83⤵PID:2104
-
\??\c:\lflllrx.exec:\lflllrx.exe84⤵PID:2888
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe85⤵PID:4048
-
\??\c:\9ffrlrl.exec:\9ffrlrl.exe86⤵PID:468
-
\??\c:\hhbtnt.exec:\hhbtnt.exe87⤵PID:3384
-
\??\c:\dppdp.exec:\dppdp.exe88⤵PID:1244
-
\??\c:\rlrlfxr.exec:\rlrlfxr.exe89⤵PID:2232
-
\??\c:\frlrrrr.exec:\frlrrrr.exe90⤵PID:2404
-
\??\c:\nnhbtn.exec:\nnhbtn.exe91⤵PID:4476
-
\??\c:\bnhtnb.exec:\bnhtnb.exe92⤵PID:1844
-
\??\c:\5dvpv.exec:\5dvpv.exe93⤵PID:4380
-
\??\c:\jvdjv.exec:\jvdjv.exe94⤵PID:4332
-
\??\c:\frlrlrx.exec:\frlrlrx.exe95⤵PID:3260
-
\??\c:\xxxxffl.exec:\xxxxffl.exe96⤵PID:516
-
\??\c:\httnbn.exec:\httnbn.exe97⤵PID:4424
-
\??\c:\jdvpd.exec:\jdvpd.exe98⤵PID:4528
-
\??\c:\lrxlfxx.exec:\lrxlfxx.exe99⤵PID:2632
-
\??\c:\rlflrrr.exec:\rlflrrr.exe100⤵PID:3280
-
\??\c:\hhnnnh.exec:\hhnnnh.exe101⤵PID:2188
-
\??\c:\jjvdv.exec:\jjvdv.exe102⤵PID:1364
-
\??\c:\jdvpd.exec:\jdvpd.exe103⤵PID:1156
-
\??\c:\1llfllx.exec:\1llfllx.exe104⤵PID:2728
-
\??\c:\nhthnh.exec:\nhthnh.exe105⤵PID:1904
-
\??\c:\ththhh.exec:\ththhh.exe106⤵PID:2444
-
\??\c:\jddpp.exec:\jddpp.exe107⤵PID:2152
-
\??\c:\9pdvj.exec:\9pdvj.exe108⤵PID:4600
-
\??\c:\7rrlflf.exec:\7rrlflf.exe109⤵PID:2836
-
\??\c:\xlrxxxr.exec:\xlrxxxr.exe110⤵PID:3836
-
\??\c:\hhhbbn.exec:\hhhbbn.exe111⤵PID:1624
-
\??\c:\7ffxrrr.exec:\7ffxrrr.exe112⤵PID:528
-
\??\c:\5rrrffx.exec:\5rrrffx.exe113⤵PID:5116
-
\??\c:\ttttbb.exec:\ttttbb.exe114⤵PID:1760
-
\??\c:\5bbbnn.exec:\5bbbnn.exe115⤵PID:1352
-
\??\c:\jjjdj.exec:\jjjdj.exe116⤵PID:3036
-
\??\c:\dpjdd.exec:\dpjdd.exe117⤵PID:4172
-
\??\c:\frfrlfr.exec:\frfrlfr.exe118⤵PID:3176
-
\??\c:\7lfrxrf.exec:\7lfrxrf.exe119⤵PID:2164
-
\??\c:\xlxllff.exec:\xlxllff.exe120⤵PID:1360
-
\??\c:\ntnhhb.exec:\ntnhhb.exe121⤵PID:1876
-
\??\c:\9httbn.exec:\9httbn.exe122⤵PID:4640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-