Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
05763fefb28bc86174408d543c8e9e57
-
SHA1
93f80616ed7b3a874ba3a2eb970e2461d4f77a39
-
SHA256
4b862a4d96227563ad77fd1aabf0e4446586f544599a01ecbad00b3c1f79850f
-
SHA512
f3aa8069dc115997d1da7030e06a3c12a18268fa78f6f4d33a4450cf60728598cba69a90c200feb0448e03f05f47792f4b63f5ae54bd2fa04a5555c903bf274c
-
SSDEEP
49152:bsI6FDcQ7zhwf5qm3Lc0UY0n4T4DsbFPE4rqyIFqyopo:mCQJwf5qmjF0n4b+4eH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp -
Loads dropped DLL 11 IoCs
pid Process 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp 3052 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28 PID 2904 wrote to memory of 3052 2904 05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\is-PQIVP.tmp\05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-PQIVP.tmp\05763fefb28bc86174408d543c8e9e57_JaffaCakes118.tmp" /SL5="$400F2,2210803,214528,C:\Users\Admin\AppData\Local\Temp\05763fefb28bc86174408d543c8e9e57_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c7359107341e5b41acf3be4579b55bf0
SHA1b52899c16b7b63c278bb4efd065375ac78f1f84b
SHA2560ae9dda4dca44543918635edbf9714c266ba1604328bd752ea2967047830c093
SHA512a2c35cc2bcd7d26f399f78b2115efde27fc89c93fce6866b82fe972400e01a5edc5921da976bedb11e70c4b7ba2cd4b6aeff1609d95677c5d3a2eef85c371368
-
Filesize
4.2MB
MD55efe1b278bb802d7684c75e8645c460a
SHA1d4f6dd2c7c922eee5cf8cb170d1074df696413c3
SHA2562a624fabd656d8b69b384be0e73045e0c6959af51c43ae094847558da520ef38
SHA51244b1dffa958bda2f125f6148bde7bb385698ec4e756f1a1ce0a95361386e83458e6bf3ee6e584d7b59fa20c6946090713baf1ab21c24beaba0ec743a0c8c5462
-
Filesize
117KB
MD58e49aa85a7da6cd70eb7c15e4c828b4e
SHA1973cdc9c10e71c0b07ef2d70a9fc30bb8cc72426
SHA25657c40a9d2e592d968daa0f092abfa7abe2b41c47eb718adb770bd6930ec0dba4
SHA512c7e0107d835bd83c7dbd666b5c768befbe303bbb126cbac905aa0c6bb91bcd0c99f03f780606fd8e23ef30b1976452d98f792107e7ed1dd6e630a99f148567f1
-
Filesize
412KB
MD5368079c424c6237e1505a7b9752aff0d
SHA1300d4dfb31357872eede6fa7e74db5f3bd5d4ab0
SHA25633fb70bf344456fb73e017f013b99be7be07812a65a7baa087aad265ad467bc4
SHA512bc4c77088e7ddf1857abd117c7921f6d111d68a82458d5f5465ab6aa1bb0e8202f08931e23bce85d2e6f7baa5a9a667af28d828d90b9f7f0f43e7604d59a8054
-
Filesize
291KB
MD52902d6187193278e2c57848db9d3f8b7
SHA1fb4beb9474cf8b6d6b251faeb23afb68e16568d4
SHA2569c358e08a19ac5d3e86321cf1b742cf06fadccaea48b00cfdd56fff7a3c9078b
SHA512c2bdbed0aaa6093ed575c9098131de5c69418274c91032a23c91d0c96473a7d969891e5bc699a912c29a729e26997bda9d7ed484a13f4d3050061d4ab6af7e1b
-
Filesize
177KB
MD5b61daffc0ce79515781319460f43bde9
SHA12bf3d2f0a88ec6f27fbb4eab507ec5d7b3431446
SHA2566969542e2233694b05b7267b6b78ee7f47e910c1ce170f901d05e48fe34d9ff6
SHA512ba65ad680d7e214c9d2ae963e2e03664b1eacd1ba72a8fd657edd3c4d9ca64da4f68e85dc19d8e6a8719ee59218c5c649b159ba72f0102cecb5eec1e04e83f32
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
165KB
MD54af80b8a27320d5685f7b255efc7c2f3
SHA1f0819580166790b745e4974c673d438ccd5a263f
SHA256592331029546d61a2be697144840fb04a84bffb95608b1d2862fca5b8dabc357
SHA512a1f719992f69e6c3f8f359259900d9a587cc02037812d8f4b8074a062c1efb68f274ef041c7898851580c207f4ab1fefd6c40f29748b4527283553de366ee77b
-
Filesize
2.3MB
MD523ecb065d45a3556164b03cd2b839bab
SHA15918643a8de0f383812e68a2dd3f3ca4387d5f03
SHA2564248e1f9c7690a0405ef9cdf82b57aa5c2d0d30771ace4af0c6a7506bcc5d871
SHA5127bff2ea16f3fc953983ec5c4ba0404326a1feb5fc1059de444e3da2db760010b326bbf6382023f581b52835d1f2df46f465743cd80f1426c1ed53bce305e90ec
-
Filesize
1.2MB
MD5cb33ff3204491fab4686d61710d3ea24
SHA132b89dbe761f7486c68d1767563d8ad1f08d99ef
SHA256ff652f10ac6dbf8d4965f6624339c67e02715cf499ad8b26c1a683bd503e4136
SHA512ed888d1f3cb5865217f4952edcc5cc592dac9f4efc1ef44b8de960425f49f6155cd3f9b663dd7b9b834210cc10c99119cb27b9a97cd747cf7991812b1d0e29d8