Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 08:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe
-
Size
45KB
-
MD5
293693f57f6fe0e491e7a13d8b12b331
-
SHA1
fda2ac5935d089ef6548fae7f1903d36504fc336
-
SHA256
c88496de64b89f3e250bb9f800d2e936227e6de5a10eee5680bbaf087268c0c5
-
SHA512
3caa821cc99be89b19099c6a22e9527a33e78188924f8f38e2a13e5e24f3f97f71c4a8d931cc34926c27fd83fa139dd44e46ea5b35b84b3a7e992235f76e7d89
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRk34XV:nSgy19JSVO1ONn511/tivXZzOmRkIT/R
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1176 thhhhh.exe 2988 dvjpd.exe 2644 3jdvv.exe 1804 jdvvv.exe 2684 1lxxffl.exe 2588 1xrlrrr.exe 2780 nhttbb.exe 2512 bthnbb.exe 2476 dvdjp.exe 2628 xrrllfr.exe 2712 3xllrxf.exe 1808 5ttthh.exe 1420 vpjvp.exe 2756 pjppd.exe 2816 7lxfxlr.exe 352 hbbhbb.exe 2144 bhbbnn.exe 316 7dddd.exe 1996 ffrfxfr.exe 304 rlllrrx.exe 2120 hbtnhn.exe 1608 9djvv.exe 2900 vpvdj.exe 2084 rlfxlrx.exe 1948 7bnthb.exe 2860 nnnhtn.exe 2036 jjjdv.exe 540 lxrlxxf.exe 1632 7rlxflr.exe 2796 7nttth.exe 692 jdjjv.exe 2436 1rfxxxl.exe 3016 btnntb.exe 1768 btnhtt.exe 2424 vvppv.exe 1392 pjpvv.exe 1648 rlxfllr.exe 2188 xxrxrxl.exe 948 bnhhhn.exe 2848 tnbtth.exe 2060 vpjpd.exe 2204 3dppp.exe 2296 lxlflrx.exe 1492 hthhnh.exe 2248 5httbb.exe 2896 dpjjj.exe 1704 pdpvv.exe 1680 7fffrxr.exe 1176 rlxxxfl.exe 2744 btbbnn.exe 3040 thtbth.exe 2660 jdpvj.exe 2852 7dppv.exe 2684 3fxxrrx.exe 2720 xxrxlxl.exe 840 1hbnnt.exe 2520 jdjjd.exe 2484 dpvvj.exe 2540 lfxfrxl.exe 2920 lfflxfx.exe 2936 bbhhnn.exe 1832 hbnhnn.exe 1664 jdjdp.exe 2700 jdvdj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1176 1276 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 28 PID 1276 wrote to memory of 1176 1276 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 28 PID 1276 wrote to memory of 1176 1276 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 28 PID 1276 wrote to memory of 1176 1276 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 28 PID 1176 wrote to memory of 2988 1176 thhhhh.exe 29 PID 1176 wrote to memory of 2988 1176 thhhhh.exe 29 PID 1176 wrote to memory of 2988 1176 thhhhh.exe 29 PID 1176 wrote to memory of 2988 1176 thhhhh.exe 29 PID 2988 wrote to memory of 2644 2988 dvjpd.exe 30 PID 2988 wrote to memory of 2644 2988 dvjpd.exe 30 PID 2988 wrote to memory of 2644 2988 dvjpd.exe 30 PID 2988 wrote to memory of 2644 2988 dvjpd.exe 30 PID 2644 wrote to memory of 1804 2644 3jdvv.exe 31 PID 2644 wrote to memory of 1804 2644 3jdvv.exe 31 PID 2644 wrote to memory of 1804 2644 3jdvv.exe 31 PID 2644 wrote to memory of 1804 2644 3jdvv.exe 31 PID 1804 wrote to memory of 2684 1804 jdvvv.exe 32 PID 1804 wrote to memory of 2684 1804 jdvvv.exe 32 PID 1804 wrote to memory of 2684 1804 jdvvv.exe 32 PID 1804 wrote to memory of 2684 1804 jdvvv.exe 32 PID 2684 wrote to memory of 2588 2684 1lxxffl.exe 33 PID 2684 wrote to memory of 2588 2684 1lxxffl.exe 33 PID 2684 wrote to memory of 2588 2684 1lxxffl.exe 33 PID 2684 wrote to memory of 2588 2684 1lxxffl.exe 33 PID 2588 wrote to memory of 2780 2588 1xrlrrr.exe 34 PID 2588 wrote to memory of 2780 2588 1xrlrrr.exe 34 PID 2588 wrote to memory of 2780 2588 1xrlrrr.exe 34 PID 2588 wrote to memory of 2780 2588 1xrlrrr.exe 34 PID 2780 wrote to memory of 2512 2780 nhttbb.exe 35 PID 2780 wrote to memory of 2512 2780 nhttbb.exe 35 PID 2780 wrote to memory of 2512 2780 nhttbb.exe 35 PID 2780 wrote to memory of 2512 2780 nhttbb.exe 35 PID 2512 wrote to memory of 2476 2512 bthnbb.exe 36 PID 2512 wrote to memory of 2476 2512 bthnbb.exe 36 PID 2512 wrote to memory of 2476 2512 bthnbb.exe 36 PID 2512 wrote to memory of 2476 2512 bthnbb.exe 36 PID 2476 wrote to memory of 2628 2476 dvdjp.exe 37 PID 2476 wrote to memory of 2628 2476 dvdjp.exe 37 PID 2476 wrote to memory of 2628 2476 dvdjp.exe 37 PID 2476 wrote to memory of 2628 2476 dvdjp.exe 37 PID 2628 wrote to memory of 2712 2628 xrrllfr.exe 38 PID 2628 wrote to memory of 2712 2628 xrrllfr.exe 38 PID 2628 wrote to memory of 2712 2628 xrrllfr.exe 38 PID 2628 wrote to memory of 2712 2628 xrrllfr.exe 38 PID 2712 wrote to memory of 1808 2712 3xllrxf.exe 39 PID 2712 wrote to memory of 1808 2712 3xllrxf.exe 39 PID 2712 wrote to memory of 1808 2712 3xllrxf.exe 39 PID 2712 wrote to memory of 1808 2712 3xllrxf.exe 39 PID 1808 wrote to memory of 1420 1808 5ttthh.exe 40 PID 1808 wrote to memory of 1420 1808 5ttthh.exe 40 PID 1808 wrote to memory of 1420 1808 5ttthh.exe 40 PID 1808 wrote to memory of 1420 1808 5ttthh.exe 40 PID 1420 wrote to memory of 2756 1420 vpjvp.exe 41 PID 1420 wrote to memory of 2756 1420 vpjvp.exe 41 PID 1420 wrote to memory of 2756 1420 vpjvp.exe 41 PID 1420 wrote to memory of 2756 1420 vpjvp.exe 41 PID 2756 wrote to memory of 2816 2756 pjppd.exe 42 PID 2756 wrote to memory of 2816 2756 pjppd.exe 42 PID 2756 wrote to memory of 2816 2756 pjppd.exe 42 PID 2756 wrote to memory of 2816 2756 pjppd.exe 42 PID 2816 wrote to memory of 352 2816 7lxfxlr.exe 43 PID 2816 wrote to memory of 352 2816 7lxfxlr.exe 43 PID 2816 wrote to memory of 352 2816 7lxfxlr.exe 43 PID 2816 wrote to memory of 352 2816 7lxfxlr.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\thhhhh.exec:\thhhhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\dvjpd.exec:\dvjpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\3jdvv.exec:\3jdvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\jdvvv.exec:\jdvvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\1lxxffl.exec:\1lxxffl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\1xrlrrr.exec:\1xrlrrr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\nhttbb.exec:\nhttbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\bthnbb.exec:\bthnbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\dvdjp.exec:\dvdjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\xrrllfr.exec:\xrrllfr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\3xllrxf.exec:\3xllrxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\5ttthh.exec:\5ttthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\vpjvp.exec:\vpjvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\pjppd.exec:\pjppd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\7lxfxlr.exec:\7lxfxlr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\hbbhbb.exec:\hbbhbb.exe17⤵
- Executes dropped EXE
PID:352 -
\??\c:\bhbbnn.exec:\bhbbnn.exe18⤵
- Executes dropped EXE
PID:2144 -
\??\c:\7dddd.exec:\7dddd.exe19⤵
- Executes dropped EXE
PID:316 -
\??\c:\ffrfxfr.exec:\ffrfxfr.exe20⤵
- Executes dropped EXE
PID:1996 -
\??\c:\rlllrrx.exec:\rlllrrx.exe21⤵
- Executes dropped EXE
PID:304 -
\??\c:\hbtnhn.exec:\hbtnhn.exe22⤵
- Executes dropped EXE
PID:2120 -
\??\c:\9djvv.exec:\9djvv.exe23⤵
- Executes dropped EXE
PID:1608 -
\??\c:\vpvdj.exec:\vpvdj.exe24⤵
- Executes dropped EXE
PID:2900 -
\??\c:\rlfxlrx.exec:\rlfxlrx.exe25⤵
- Executes dropped EXE
PID:2084 -
\??\c:\7bnthb.exec:\7bnthb.exe26⤵
- Executes dropped EXE
PID:1948 -
\??\c:\nnnhtn.exec:\nnnhtn.exe27⤵
- Executes dropped EXE
PID:2860 -
\??\c:\jjjdv.exec:\jjjdv.exe28⤵
- Executes dropped EXE
PID:2036 -
\??\c:\lxrlxxf.exec:\lxrlxxf.exe29⤵
- Executes dropped EXE
PID:540 -
\??\c:\7rlxflr.exec:\7rlxflr.exe30⤵
- Executes dropped EXE
PID:1632 -
\??\c:\7nttth.exec:\7nttth.exe31⤵
- Executes dropped EXE
PID:2796 -
\??\c:\jdjjv.exec:\jdjjv.exe32⤵
- Executes dropped EXE
PID:692 -
\??\c:\1rfxxxl.exec:\1rfxxxl.exe33⤵
- Executes dropped EXE
PID:2436 -
\??\c:\btnntb.exec:\btnntb.exe34⤵
- Executes dropped EXE
PID:3016 -
\??\c:\btnhtt.exec:\btnhtt.exe35⤵
- Executes dropped EXE
PID:1768 -
\??\c:\vvppv.exec:\vvppv.exe36⤵
- Executes dropped EXE
PID:2424 -
\??\c:\pjpvv.exec:\pjpvv.exe37⤵
- Executes dropped EXE
PID:1392 -
\??\c:\rlxfllr.exec:\rlxfllr.exe38⤵
- Executes dropped EXE
PID:1648 -
\??\c:\xxrxrxl.exec:\xxrxrxl.exe39⤵
- Executes dropped EXE
PID:2188 -
\??\c:\bnhhhn.exec:\bnhhhn.exe40⤵
- Executes dropped EXE
PID:948 -
\??\c:\tnbtth.exec:\tnbtth.exe41⤵
- Executes dropped EXE
PID:2848 -
\??\c:\vpjpd.exec:\vpjpd.exe42⤵
- Executes dropped EXE
PID:2060 -
\??\c:\3dppp.exec:\3dppp.exe43⤵
- Executes dropped EXE
PID:2204 -
\??\c:\lxlflrx.exec:\lxlflrx.exe44⤵
- Executes dropped EXE
PID:2296 -
\??\c:\hthhnh.exec:\hthhnh.exe45⤵
- Executes dropped EXE
PID:1492 -
\??\c:\5httbb.exec:\5httbb.exe46⤵
- Executes dropped EXE
PID:2248 -
\??\c:\dpjjj.exec:\dpjjj.exe47⤵
- Executes dropped EXE
PID:2896 -
\??\c:\pdpvv.exec:\pdpvv.exe48⤵
- Executes dropped EXE
PID:1704 -
\??\c:\7fffrxr.exec:\7fffrxr.exe49⤵
- Executes dropped EXE
PID:1680 -
\??\c:\rlxxxfl.exec:\rlxxxfl.exe50⤵
- Executes dropped EXE
PID:1176 -
\??\c:\btbbnn.exec:\btbbnn.exe51⤵
- Executes dropped EXE
PID:2744 -
\??\c:\thtbth.exec:\thtbth.exe52⤵
- Executes dropped EXE
PID:3040 -
\??\c:\jdpvj.exec:\jdpvj.exe53⤵
- Executes dropped EXE
PID:2660 -
\??\c:\7dppv.exec:\7dppv.exe54⤵
- Executes dropped EXE
PID:2852 -
\??\c:\3fxxrrx.exec:\3fxxrrx.exe55⤵
- Executes dropped EXE
PID:2684 -
\??\c:\xxrxlxl.exec:\xxrxlxl.exe56⤵
- Executes dropped EXE
PID:2720 -
\??\c:\1hbnnt.exec:\1hbnnt.exe57⤵
- Executes dropped EXE
PID:840 -
\??\c:\jdjjd.exec:\jdjjd.exe58⤵
- Executes dropped EXE
PID:2520 -
\??\c:\dpvvj.exec:\dpvvj.exe59⤵
- Executes dropped EXE
PID:2484 -
\??\c:\lfxfrxl.exec:\lfxfrxl.exe60⤵
- Executes dropped EXE
PID:2540 -
\??\c:\lfflxfx.exec:\lfflxfx.exe61⤵
- Executes dropped EXE
PID:2920 -
\??\c:\bbhhnn.exec:\bbhhnn.exe62⤵
- Executes dropped EXE
PID:2936 -
\??\c:\hbnhnn.exec:\hbnhnn.exe63⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jdjdp.exec:\jdjdp.exe64⤵
- Executes dropped EXE
PID:1664 -
\??\c:\jdvdj.exec:\jdvdj.exe65⤵
- Executes dropped EXE
PID:2700 -
\??\c:\xrlrrxl.exec:\xrlrrxl.exe66⤵PID:2552
-
\??\c:\xxrrffr.exec:\xxrrffr.exe67⤵PID:2276
-
\??\c:\tnbbbb.exec:\tnbbbb.exe68⤵PID:784
-
\??\c:\htnhtb.exec:\htnhtb.exe69⤵PID:1840
-
\??\c:\btbhhb.exec:\btbhhb.exe70⤵PID:1860
-
\??\c:\5dpvd.exec:\5dpvd.exe71⤵PID:1880
-
\??\c:\3djjj.exec:\3djjj.exe72⤵PID:2268
-
\??\c:\rlxlflr.exec:\rlxlflr.exe73⤵PID:2352
-
\??\c:\3lxlrrr.exec:\3lxlrrr.exe74⤵PID:1968
-
\??\c:\nhhhnt.exec:\nhhhnt.exe75⤵PID:2356
-
\??\c:\jddjv.exec:\jddjv.exe76⤵PID:1620
-
\??\c:\dvjjv.exec:\dvjjv.exe77⤵PID:1608
-
\??\c:\jdpvv.exec:\jdpvv.exe78⤵PID:2900
-
\??\c:\lfllxxl.exec:\lfllxxl.exe79⤵PID:1684
-
\??\c:\9fflxfl.exec:\9fflxfl.exe80⤵PID:1792
-
\??\c:\9hbbbb.exec:\9hbbbb.exe81⤵PID:1948
-
\??\c:\9bbnnt.exec:\9bbnnt.exe82⤵PID:2860
-
\??\c:\vvjjv.exec:\vvjjv.exe83⤵PID:1140
-
\??\c:\vpjpv.exec:\vpjpv.exe84⤵PID:584
-
\??\c:\jvjpj.exec:\jvjpj.exe85⤵PID:1096
-
\??\c:\9xrrrrl.exec:\9xrrrrl.exe86⤵PID:632
-
\??\c:\5xrrrrr.exec:\5xrrrrr.exe87⤵PID:788
-
\??\c:\tnhhbh.exec:\tnhhbh.exe88⤵PID:1036
-
\??\c:\tnttbb.exec:\tnttbb.exe89⤵PID:1072
-
\??\c:\vpddj.exec:\vpddj.exe90⤵PID:2092
-
\??\c:\vjvvd.exec:\vjvvd.exe91⤵PID:976
-
\??\c:\7dvpp.exec:\7dvpp.exe92⤵PID:1532
-
\??\c:\lfrxxfl.exec:\lfrxxfl.exe93⤵PID:1600
-
\??\c:\lxllxfl.exec:\lxllxfl.exe94⤵PID:1088
-
\??\c:\nnbnnb.exec:\nnbnnb.exe95⤵PID:1644
-
\??\c:\hbhbhh.exec:\hbhbhh.exe96⤵PID:660
-
\??\c:\5ddvv.exec:\5ddvv.exe97⤵PID:696
-
\??\c:\vjvdj.exec:\vjvdj.exe98⤵PID:948
-
\??\c:\dvjpd.exec:\dvjpd.exe99⤵PID:772
-
\??\c:\rfxxllx.exec:\rfxxllx.exe100⤵PID:2420
-
\??\c:\9xlfxxf.exec:\9xlfxxf.exe101⤵PID:2204
-
\??\c:\btbhnn.exec:\btbhnn.exe102⤵PID:1300
-
\??\c:\thbtbb.exec:\thbtbb.exe103⤵PID:2904
-
\??\c:\pjvjv.exec:\pjvjv.exe104⤵PID:1592
-
\??\c:\vvpvd.exec:\vvpvd.exe105⤵PID:1776
-
\??\c:\rlrrrrx.exec:\rlrrrrx.exe106⤵PID:1704
-
\??\c:\lllrfll.exec:\lllrfll.exe107⤵PID:1888
-
\??\c:\1ntbhh.exec:\1ntbhh.exe108⤵PID:2604
-
\??\c:\pjddp.exec:\pjddp.exe109⤵PID:2644
-
\??\c:\jvdjd.exec:\jvdjd.exe110⤵PID:2680
-
\??\c:\1pjjd.exec:\1pjjd.exe111⤵PID:3028
-
\??\c:\9lrxfff.exec:\9lrxfff.exe112⤵PID:2220
-
\??\c:\hbnthh.exec:\hbnthh.exe113⤵PID:2588
-
\??\c:\1nhhnn.exec:\1nhhnn.exe114⤵PID:2600
-
\??\c:\thttbt.exec:\thttbt.exe115⤵PID:2464
-
\??\c:\jpdvv.exec:\jpdvv.exe116⤵PID:2528
-
\??\c:\rlxfrxl.exec:\rlxfrxl.exe117⤵PID:2480
-
\??\c:\lfrxfrf.exec:\lfrxfrf.exe118⤵PID:2924
-
\??\c:\bthhtt.exec:\bthhtt.exe119⤵PID:1868
-
\??\c:\vpddd.exec:\vpddd.exe120⤵PID:268
-
\??\c:\vpvpd.exec:\vpvpd.exe121⤵PID:1572
-
\??\c:\xfxxfrx.exec:\xfxxfrx.exe122⤵PID:1420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-