Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 08:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe
-
Size
45KB
-
MD5
293693f57f6fe0e491e7a13d8b12b331
-
SHA1
fda2ac5935d089ef6548fae7f1903d36504fc336
-
SHA256
c88496de64b89f3e250bb9f800d2e936227e6de5a10eee5680bbaf087268c0c5
-
SHA512
3caa821cc99be89b19099c6a22e9527a33e78188924f8f38e2a13e5e24f3f97f71c4a8d931cc34926c27fd83fa139dd44e46ea5b35b84b3a7e992235f76e7d89
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRk34XV:nSgy19JSVO1ONn511/tivXZzOmRkIT/R
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1064 jvdvp.exe 4012 rfxrxlx.exe 3476 btnbtn.exe 3440 xlfxfxr.exe 2656 htnhbb.exe 2468 lrllfxl.exe 4148 tbtnhb.exe 3208 fxrlfxf.exe 2816 hbtttt.exe 3572 jvddp.exe 2844 1tntht.exe 4340 dddjd.exe 452 rflrffx.exe 4312 ntbhhn.exe 5104 hhhbnt.exe 4556 pdvjv.exe 4884 ttnhtt.exe 464 dpdvp.exe 3648 bhhnnb.exe 3124 rxxrfrf.exe 224 bhhbtt.exe 620 vvdvj.exe 4880 dvvjv.exe 3744 ttbhhb.exe 1184 pdvvj.exe 448 flfrrlr.exe 4644 frffxrl.exe 1920 tnhhbt.exe 2824 thbbht.exe 3484 9ddvp.exe 3768 frflfll.exe 1124 lxrlfxr.exe 2120 ttnhht.exe 3348 hnnbnh.exe 1232 7jjvj.exe 5028 dppdp.exe 1556 jdddv.exe 1216 fflxlxl.exe 1116 rrffflr.exe 4128 bnbnbt.exe 3096 5hbtbb.exe 544 1jpjd.exe 4148 xxrfxxx.exe 3552 1btnnn.exe 3356 1tbtnn.exe 2816 hbbbnn.exe 1156 1dpdp.exe 3572 xrlrlxf.exe 4432 hbhbnb.exe 3728 jddpv.exe 3248 djpjv.exe 3544 rxlrrfr.exe 940 nhntnb.exe 1164 bttthn.exe 2004 pjdjp.exe 4396 vjpjd.exe 3216 lrxxrfl.exe 1580 hbhbnt.exe 4408 hbthtn.exe 464 dddpj.exe 4168 lxxlffx.exe 4988 rflxllf.exe 2056 hnbnnb.exe 2348 vjppd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1064 2740 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 83 PID 2740 wrote to memory of 1064 2740 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 83 PID 2740 wrote to memory of 1064 2740 293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe 83 PID 1064 wrote to memory of 4012 1064 jvdvp.exe 85 PID 1064 wrote to memory of 4012 1064 jvdvp.exe 85 PID 1064 wrote to memory of 4012 1064 jvdvp.exe 85 PID 4012 wrote to memory of 3476 4012 rfxrxlx.exe 87 PID 4012 wrote to memory of 3476 4012 rfxrxlx.exe 87 PID 4012 wrote to memory of 3476 4012 rfxrxlx.exe 87 PID 3476 wrote to memory of 3440 3476 btnbtn.exe 89 PID 3476 wrote to memory of 3440 3476 btnbtn.exe 89 PID 3476 wrote to memory of 3440 3476 btnbtn.exe 89 PID 3440 wrote to memory of 2656 3440 xlfxfxr.exe 90 PID 3440 wrote to memory of 2656 3440 xlfxfxr.exe 90 PID 3440 wrote to memory of 2656 3440 xlfxfxr.exe 90 PID 2656 wrote to memory of 2468 2656 htnhbb.exe 91 PID 2656 wrote to memory of 2468 2656 htnhbb.exe 91 PID 2656 wrote to memory of 2468 2656 htnhbb.exe 91 PID 2468 wrote to memory of 4148 2468 lrllfxl.exe 92 PID 2468 wrote to memory of 4148 2468 lrllfxl.exe 92 PID 2468 wrote to memory of 4148 2468 lrllfxl.exe 92 PID 4148 wrote to memory of 3208 4148 tbtnhb.exe 93 PID 4148 wrote to memory of 3208 4148 tbtnhb.exe 93 PID 4148 wrote to memory of 3208 4148 tbtnhb.exe 93 PID 3208 wrote to memory of 2816 3208 fxrlfxf.exe 94 PID 3208 wrote to memory of 2816 3208 fxrlfxf.exe 94 PID 3208 wrote to memory of 2816 3208 fxrlfxf.exe 94 PID 2816 wrote to memory of 3572 2816 hbtttt.exe 95 PID 2816 wrote to memory of 3572 2816 hbtttt.exe 95 PID 2816 wrote to memory of 3572 2816 hbtttt.exe 95 PID 3572 wrote to memory of 2844 3572 jvddp.exe 96 PID 3572 wrote to memory of 2844 3572 jvddp.exe 96 PID 3572 wrote to memory of 2844 3572 jvddp.exe 96 PID 2844 wrote to memory of 4340 2844 1tntht.exe 97 PID 2844 wrote to memory of 4340 2844 1tntht.exe 97 PID 2844 wrote to memory of 4340 2844 1tntht.exe 97 PID 4340 wrote to memory of 452 4340 dddjd.exe 98 PID 4340 wrote to memory of 452 4340 dddjd.exe 98 PID 4340 wrote to memory of 452 4340 dddjd.exe 98 PID 452 wrote to memory of 4312 452 rflrffx.exe 101 PID 452 wrote to memory of 4312 452 rflrffx.exe 101 PID 452 wrote to memory of 4312 452 rflrffx.exe 101 PID 4312 wrote to memory of 5104 4312 ntbhhn.exe 102 PID 4312 wrote to memory of 5104 4312 ntbhhn.exe 102 PID 4312 wrote to memory of 5104 4312 ntbhhn.exe 102 PID 5104 wrote to memory of 4556 5104 hhhbnt.exe 103 PID 5104 wrote to memory of 4556 5104 hhhbnt.exe 103 PID 5104 wrote to memory of 4556 5104 hhhbnt.exe 103 PID 4556 wrote to memory of 4884 4556 pdvjv.exe 105 PID 4556 wrote to memory of 4884 4556 pdvjv.exe 105 PID 4556 wrote to memory of 4884 4556 pdvjv.exe 105 PID 4884 wrote to memory of 464 4884 ttnhtt.exe 106 PID 4884 wrote to memory of 464 4884 ttnhtt.exe 106 PID 4884 wrote to memory of 464 4884 ttnhtt.exe 106 PID 464 wrote to memory of 3648 464 dpdvp.exe 108 PID 464 wrote to memory of 3648 464 dpdvp.exe 108 PID 464 wrote to memory of 3648 464 dpdvp.exe 108 PID 3648 wrote to memory of 3124 3648 bhhnnb.exe 111 PID 3648 wrote to memory of 3124 3648 bhhnnb.exe 111 PID 3648 wrote to memory of 3124 3648 bhhnnb.exe 111 PID 3124 wrote to memory of 224 3124 rxxrfrf.exe 112 PID 3124 wrote to memory of 224 3124 rxxrfrf.exe 112 PID 3124 wrote to memory of 224 3124 rxxrfrf.exe 112 PID 224 wrote to memory of 620 224 bhhbtt.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\293693f57f6fe0e491e7a13d8b12b331_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\jvdvp.exec:\jvdvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\rfxrxlx.exec:\rfxrxlx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\btnbtn.exec:\btnbtn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\xlfxfxr.exec:\xlfxfxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\htnhbb.exec:\htnhbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\lrllfxl.exec:\lrllfxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\tbtnhb.exec:\tbtnhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
\??\c:\fxrlfxf.exec:\fxrlfxf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\hbtttt.exec:\hbtttt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\jvddp.exec:\jvddp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\1tntht.exec:\1tntht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\dddjd.exec:\dddjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\rflrffx.exec:\rflrffx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
\??\c:\ntbhhn.exec:\ntbhhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
\??\c:\hhhbnt.exec:\hhhbnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\pdvjv.exec:\pdvjv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\ttnhtt.exec:\ttnhtt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\dpdvp.exec:\dpdvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\bhhnnb.exec:\bhhnnb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
\??\c:\rxxrfrf.exec:\rxxrfrf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\bhhbtt.exec:\bhhbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
\??\c:\vvdvj.exec:\vvdvj.exe23⤵
- Executes dropped EXE
PID:620 -
\??\c:\dvvjv.exec:\dvvjv.exe24⤵
- Executes dropped EXE
PID:4880 -
\??\c:\ttbhhb.exec:\ttbhhb.exe25⤵
- Executes dropped EXE
PID:3744 -
\??\c:\pdvvj.exec:\pdvvj.exe26⤵
- Executes dropped EXE
PID:1184 -
\??\c:\flfrrlr.exec:\flfrrlr.exe27⤵
- Executes dropped EXE
PID:448 -
\??\c:\frffxrl.exec:\frffxrl.exe28⤵
- Executes dropped EXE
PID:4644 -
\??\c:\tnhhbt.exec:\tnhhbt.exe29⤵
- Executes dropped EXE
PID:1920 -
\??\c:\thbbht.exec:\thbbht.exe30⤵
- Executes dropped EXE
PID:2824 -
\??\c:\9ddvp.exec:\9ddvp.exe31⤵
- Executes dropped EXE
PID:3484 -
\??\c:\frflfll.exec:\frflfll.exe32⤵
- Executes dropped EXE
PID:3768 -
\??\c:\lxrlfxr.exec:\lxrlfxr.exe33⤵
- Executes dropped EXE
PID:1124 -
\??\c:\ttnhht.exec:\ttnhht.exe34⤵
- Executes dropped EXE
PID:2120 -
\??\c:\hnnbnh.exec:\hnnbnh.exe35⤵
- Executes dropped EXE
PID:3348 -
\??\c:\7jjvj.exec:\7jjvj.exe36⤵
- Executes dropped EXE
PID:1232 -
\??\c:\dppdp.exec:\dppdp.exe37⤵
- Executes dropped EXE
PID:5028 -
\??\c:\jdddv.exec:\jdddv.exe38⤵
- Executes dropped EXE
PID:1556 -
\??\c:\fflxlxl.exec:\fflxlxl.exe39⤵
- Executes dropped EXE
PID:1216 -
\??\c:\rrffflr.exec:\rrffflr.exe40⤵
- Executes dropped EXE
PID:1116 -
\??\c:\bnbnbt.exec:\bnbnbt.exe41⤵
- Executes dropped EXE
PID:4128 -
\??\c:\5hbtbb.exec:\5hbtbb.exe42⤵
- Executes dropped EXE
PID:3096 -
\??\c:\1jpjd.exec:\1jpjd.exe43⤵
- Executes dropped EXE
PID:544 -
\??\c:\xxrfxxx.exec:\xxrfxxx.exe44⤵
- Executes dropped EXE
PID:4148 -
\??\c:\1btnnn.exec:\1btnnn.exe45⤵
- Executes dropped EXE
PID:3552 -
\??\c:\1tbtnn.exec:\1tbtnn.exe46⤵
- Executes dropped EXE
PID:3356 -
\??\c:\hbbbnn.exec:\hbbbnn.exe47⤵
- Executes dropped EXE
PID:2816 -
\??\c:\1dpdp.exec:\1dpdp.exe48⤵
- Executes dropped EXE
PID:1156 -
\??\c:\xrlrlxf.exec:\xrlrlxf.exe49⤵
- Executes dropped EXE
PID:3572 -
\??\c:\hbhbnb.exec:\hbhbnb.exe50⤵
- Executes dropped EXE
PID:4432 -
\??\c:\jddpv.exec:\jddpv.exe51⤵
- Executes dropped EXE
PID:3728 -
\??\c:\djpjv.exec:\djpjv.exe52⤵
- Executes dropped EXE
PID:3248 -
\??\c:\rxlrrfr.exec:\rxlrrfr.exe53⤵
- Executes dropped EXE
PID:3544 -
\??\c:\nhntnb.exec:\nhntnb.exe54⤵
- Executes dropped EXE
PID:940 -
\??\c:\bttthn.exec:\bttthn.exe55⤵
- Executes dropped EXE
PID:1164 -
\??\c:\pjdjp.exec:\pjdjp.exe56⤵
- Executes dropped EXE
PID:2004 -
\??\c:\vjpjd.exec:\vjpjd.exe57⤵
- Executes dropped EXE
PID:4396 -
\??\c:\lrxxrfl.exec:\lrxxrfl.exe58⤵
- Executes dropped EXE
PID:3216 -
\??\c:\hbhbnt.exec:\hbhbnt.exe59⤵
- Executes dropped EXE
PID:1580 -
\??\c:\hbthtn.exec:\hbthtn.exe60⤵
- Executes dropped EXE
PID:4408 -
\??\c:\dddpj.exec:\dddpj.exe61⤵
- Executes dropped EXE
PID:464 -
\??\c:\lxxlffx.exec:\lxxlffx.exe62⤵
- Executes dropped EXE
PID:4168 -
\??\c:\rflxllf.exec:\rflxllf.exe63⤵
- Executes dropped EXE
PID:4988 -
\??\c:\hnbnnb.exec:\hnbnnb.exe64⤵
- Executes dropped EXE
PID:2056 -
\??\c:\vjppd.exec:\vjppd.exe65⤵
- Executes dropped EXE
PID:2348 -
\??\c:\rlllxxr.exec:\rlllxxr.exe66⤵PID:1080
-
\??\c:\bnhbhb.exec:\bnhbhb.exe67⤵PID:4980
-
\??\c:\5rlfxxr.exec:\5rlfxxr.exe68⤵PID:1028
-
\??\c:\thbtnn.exec:\thbtnn.exe69⤵PID:3924
-
\??\c:\vpppd.exec:\vpppd.exe70⤵PID:5084
-
\??\c:\dvdpp.exec:\dvdpp.exe71⤵PID:3304
-
\??\c:\lfrllrr.exec:\lfrllrr.exe72⤵PID:4880
-
\??\c:\nhhbnh.exec:\nhhbnh.exe73⤵PID:4772
-
\??\c:\tbbthh.exec:\tbbthh.exe74⤵PID:3872
-
\??\c:\jjpjd.exec:\jjpjd.exe75⤵PID:4552
-
\??\c:\xrxrxxf.exec:\xrxrxxf.exe76⤵PID:3232
-
\??\c:\btbtnb.exec:\btbtnb.exe77⤵PID:3628
-
\??\c:\dvvpv.exec:\dvvpv.exe78⤵PID:1288
-
\??\c:\flrlfxr.exec:\flrlfxr.exe79⤵PID:2380
-
\??\c:\1frfxxr.exec:\1frfxxr.exe80⤵PID:2444
-
\??\c:\5hbtnn.exec:\5hbtnn.exe81⤵PID:4136
-
\??\c:\9vvpj.exec:\9vvpj.exe82⤵PID:3348
-
\??\c:\bbtthh.exec:\bbtthh.exe83⤵PID:1232
-
\??\c:\9vdjd.exec:\9vdjd.exe84⤵PID:3700
-
\??\c:\3ffxlxr.exec:\3ffxlxr.exe85⤵PID:4404
-
\??\c:\xrrlffr.exec:\xrrlffr.exe86⤵PID:2992
-
\??\c:\bnhbnh.exec:\bnhbnh.exe87⤵PID:2468
-
\??\c:\ppppd.exec:\ppppd.exe88⤵PID:4184
-
\??\c:\vpdjp.exec:\vpdjp.exe89⤵PID:2656
-
\??\c:\lffrllf.exec:\lffrllf.exe90⤵PID:4148
-
\??\c:\bnhhth.exec:\bnhhth.exe91⤵PID:1716
-
\??\c:\hhnbbn.exec:\hhnbbn.exe92⤵PID:1560
-
\??\c:\vjddj.exec:\vjddj.exe93⤵PID:2252
-
\??\c:\dpvvv.exec:\dpvvv.exe94⤵PID:3772
-
\??\c:\rxfxxff.exec:\rxfxxff.exe95⤵PID:2844
-
\??\c:\flffxfr.exec:\flffxfr.exe96⤵PID:8
-
\??\c:\btnhtn.exec:\btnhtn.exe97⤵PID:1144
-
\??\c:\hnnhhb.exec:\hnnhhb.exe98⤵PID:3248
-
\??\c:\9jdvj.exec:\9jdvj.exe99⤵PID:1812
-
\??\c:\hbhbnh.exec:\hbhbnh.exe100⤵PID:392
-
\??\c:\vpjjd.exec:\vpjjd.exe101⤵PID:2220
-
\??\c:\lrrfxrl.exec:\lrrfxrl.exe102⤵PID:400
-
\??\c:\xxxrfxr.exec:\xxxrfxr.exe103⤵PID:4396
-
\??\c:\hnnhhb.exec:\hnnhhb.exe104⤵PID:3216
-
\??\c:\bnhnnb.exec:\bnhnnb.exe105⤵PID:4312
-
\??\c:\vvppd.exec:\vvppd.exe106⤵PID:2508
-
\??\c:\lxrfxrl.exec:\lxrfxrl.exe107⤵PID:464
-
\??\c:\bthnth.exec:\bthnth.exe108⤵PID:4168
-
\??\c:\nbbnbt.exec:\nbbnbt.exe109⤵PID:1604
-
\??\c:\vpvpv.exec:\vpvpv.exe110⤵PID:2972
-
\??\c:\fffrxrf.exec:\fffrxrf.exe111⤵PID:2348
-
\??\c:\fflrllx.exec:\fflrllx.exe112⤵PID:1080
-
\??\c:\htbtbb.exec:\htbtbb.exe113⤵PID:2492
-
\??\c:\thhbtn.exec:\thhbtn.exe114⤵PID:4584
-
\??\c:\hbtnbt.exec:\hbtnbt.exe115⤵PID:1736
-
\??\c:\djvpj.exec:\djvpj.exe116⤵PID:3164
-
\??\c:\pddvv.exec:\pddvv.exe117⤵PID:3460
-
\??\c:\frfxlfr.exec:\frfxlfr.exe118⤵PID:1448
-
\??\c:\rlfrlrf.exec:\rlfrlrf.exe119⤵PID:4440
-
\??\c:\tttnhh.exec:\tttnhh.exe120⤵PID:3968
-
\??\c:\tnhbhh.exec:\tnhbhh.exe121⤵PID:4552
-
\??\c:\vjdvj.exec:\vjdvj.exe122⤵PID:3644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-