Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe
Resource
win10v2004-20240426-en
1 signatures
150 seconds
General
-
Target
0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe
-
Size
511KB
-
MD5
0e9ba45cb73a4c581b83f5a3526f84b4
-
SHA1
313b58e9221b1d456a68e98b93006fed936b6379
-
SHA256
d634604dd976e7de4b8cffcfadd86ae6609efe8a0f696a01b5e8acaa7f13d993
-
SHA512
68d2590e4020b22ded78c463668292e51740dd2bc18728058c61f0f5ed8a38fe28d8668d351df7b9354350ec32bcfff5d0a06f171ff66ba4c8770d87d82f7595
-
SSDEEP
6144:4aho6wVta6Pwo0UrrClz1sNbPqLBmLPQgnTmhCmOlV1XKV3CzIcN5fcFkJrxeIWD:JfwsW3h0S44RnTmtQUYz44eIW
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2668 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2668 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2668 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2668 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2292 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2292 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2292 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2292 2452 0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exestart2⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\0e9ba45cb73a4c581b83f5a3526f84b4_JaffaCakes118.exewatch2⤵PID:2292
-