Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 12:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe
Resource
win7-20240419-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe
-
Size
41KB
-
MD5
2f02ea089d3aaa91023bba2ac110e8bb
-
SHA1
a478fb29e3cbc7e5a37e35c2623fe08321dec577
-
SHA256
ca1c44e9e8557e3b0ea113e5f48d792f56eba4e8a01307ee67497bdb080df8d3
-
SHA512
7bc4c34e342b8f4b25643603cd45c56edf077e047c979095efdfd449dd85c9d7022938932741b6fb99fa5ff3820975151e6077807b8a102c30846de175dd34bc
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRkuU0h:nSgy19JSVO1ONn511/tivXZzOmRkuU0h
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 944 lflfflf.exe 2844 xrxxrrx.exe 2832 1jjjj.exe 4900 5bbtnn.exe 4620 vpvvv.exe 2008 jjdvj.exe 1952 lffxrxr.exe 3036 bnbbbt.exe 4644 vdvvj.exe 2096 rfrlflf.exe 1688 ntbtnn.exe 1524 tnntnn.exe 4672 dvdpj.exe 3660 jdjjv.exe 4024 fllllrr.exe 4224 nhttnt.exe 1576 vvjdd.exe 4596 xflfrrr.exe 4408 ffxflrf.exe 4820 5ntnhh.exe 2464 bbhhbh.exe 3528 vpjjv.exe 2168 3llfrxl.exe 3716 httthn.exe 4604 jjppd.exe 956 xllxllf.exe 4916 1rrlfxr.exe 2144 bhhbhn.exe 5084 vpjjj.exe 588 5jjdp.exe 3016 nbttth.exe 4040 pdjdd.exe 2408 bnntnn.exe 2576 rfrrfll.exe 4552 vpjdd.exe 2808 1xffxxr.exe 2552 htbthb.exe 3060 rrlrrrx.exe 4576 bhntbh.exe 2224 ddjjj.exe 4128 hbhtnn.exe 2640 vddvp.exe 2388 lrrrfll.exe 4492 flxxfxx.exe 4440 nbbtnh.exe 1372 vjpjd.exe 2352 1jjdp.exe 2516 7rrlxrl.exe 4540 rffxrfx.exe 3648 bttnhb.exe 180 dvvdp.exe 4368 djjdv.exe 4400 lrrlxxr.exe 856 xlrxllx.exe 3948 pdjpv.exe 4928 9dpjd.exe 944 rffxrlf.exe 1648 xlxrrrl.exe 4260 btbtbt.exe 5032 bntnhh.exe 4588 vjjdp.exe 4276 xrxrrrr.exe 3112 rrllflf.exe 2012 bbttnt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 944 856 2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe 82 PID 856 wrote to memory of 944 856 2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe 82 PID 856 wrote to memory of 944 856 2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe 82 PID 944 wrote to memory of 2844 944 lflfflf.exe 85 PID 944 wrote to memory of 2844 944 lflfflf.exe 85 PID 944 wrote to memory of 2844 944 lflfflf.exe 85 PID 2844 wrote to memory of 2832 2844 xrxxrrx.exe 87 PID 2844 wrote to memory of 2832 2844 xrxxrrx.exe 87 PID 2844 wrote to memory of 2832 2844 xrxxrrx.exe 87 PID 2832 wrote to memory of 4900 2832 1jjjj.exe 88 PID 2832 wrote to memory of 4900 2832 1jjjj.exe 88 PID 2832 wrote to memory of 4900 2832 1jjjj.exe 88 PID 4900 wrote to memory of 4620 4900 5bbtnn.exe 89 PID 4900 wrote to memory of 4620 4900 5bbtnn.exe 89 PID 4900 wrote to memory of 4620 4900 5bbtnn.exe 89 PID 4620 wrote to memory of 2008 4620 vpvvv.exe 90 PID 4620 wrote to memory of 2008 4620 vpvvv.exe 90 PID 4620 wrote to memory of 2008 4620 vpvvv.exe 90 PID 2008 wrote to memory of 1952 2008 jjdvj.exe 91 PID 2008 wrote to memory of 1952 2008 jjdvj.exe 91 PID 2008 wrote to memory of 1952 2008 jjdvj.exe 91 PID 1952 wrote to memory of 3036 1952 lffxrxr.exe 92 PID 1952 wrote to memory of 3036 1952 lffxrxr.exe 92 PID 1952 wrote to memory of 3036 1952 lffxrxr.exe 92 PID 3036 wrote to memory of 4644 3036 bnbbbt.exe 93 PID 3036 wrote to memory of 4644 3036 bnbbbt.exe 93 PID 3036 wrote to memory of 4644 3036 bnbbbt.exe 93 PID 4644 wrote to memory of 2096 4644 vdvvj.exe 94 PID 4644 wrote to memory of 2096 4644 vdvvj.exe 94 PID 4644 wrote to memory of 2096 4644 vdvvj.exe 94 PID 2096 wrote to memory of 1688 2096 rfrlflf.exe 95 PID 2096 wrote to memory of 1688 2096 rfrlflf.exe 95 PID 2096 wrote to memory of 1688 2096 rfrlflf.exe 95 PID 1688 wrote to memory of 1524 1688 ntbtnn.exe 96 PID 1688 wrote to memory of 1524 1688 ntbtnn.exe 96 PID 1688 wrote to memory of 1524 1688 ntbtnn.exe 96 PID 1524 wrote to memory of 4672 1524 tnntnn.exe 97 PID 1524 wrote to memory of 4672 1524 tnntnn.exe 97 PID 1524 wrote to memory of 4672 1524 tnntnn.exe 97 PID 4672 wrote to memory of 3660 4672 dvdpj.exe 98 PID 4672 wrote to memory of 3660 4672 dvdpj.exe 98 PID 4672 wrote to memory of 3660 4672 dvdpj.exe 98 PID 3660 wrote to memory of 4024 3660 jdjjv.exe 99 PID 3660 wrote to memory of 4024 3660 jdjjv.exe 99 PID 3660 wrote to memory of 4024 3660 jdjjv.exe 99 PID 4024 wrote to memory of 4224 4024 fllllrr.exe 100 PID 4024 wrote to memory of 4224 4024 fllllrr.exe 100 PID 4024 wrote to memory of 4224 4024 fllllrr.exe 100 PID 4224 wrote to memory of 1576 4224 nhttnt.exe 101 PID 4224 wrote to memory of 1576 4224 nhttnt.exe 101 PID 4224 wrote to memory of 1576 4224 nhttnt.exe 101 PID 1576 wrote to memory of 4596 1576 vvjdd.exe 102 PID 1576 wrote to memory of 4596 1576 vvjdd.exe 102 PID 1576 wrote to memory of 4596 1576 vvjdd.exe 102 PID 4596 wrote to memory of 4408 4596 xflfrrr.exe 103 PID 4596 wrote to memory of 4408 4596 xflfrrr.exe 103 PID 4596 wrote to memory of 4408 4596 xflfrrr.exe 103 PID 4408 wrote to memory of 4820 4408 ffxflrf.exe 104 PID 4408 wrote to memory of 4820 4408 ffxflrf.exe 104 PID 4408 wrote to memory of 4820 4408 ffxflrf.exe 104 PID 4820 wrote to memory of 2464 4820 5ntnhh.exe 105 PID 4820 wrote to memory of 2464 4820 5ntnhh.exe 105 PID 4820 wrote to memory of 2464 4820 5ntnhh.exe 105 PID 2464 wrote to memory of 3528 2464 bbhhbh.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f02ea089d3aaa91023bba2ac110e8bb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\lflfflf.exec:\lflfflf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
\??\c:\xrxxrrx.exec:\xrxxrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\1jjjj.exec:\1jjjj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\5bbtnn.exec:\5bbtnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\vpvvv.exec:\vpvvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\jjdvj.exec:\jjdvj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\lffxrxr.exec:\lffxrxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\bnbbbt.exec:\bnbbbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\vdvvj.exec:\vdvvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\rfrlflf.exec:\rfrlflf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\ntbtnn.exec:\ntbtnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\tnntnn.exec:\tnntnn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\dvdpj.exec:\dvdpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\jdjjv.exec:\jdjjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
\??\c:\fllllrr.exec:\fllllrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\nhttnt.exec:\nhttnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\vvjdd.exec:\vvjdd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\xflfrrr.exec:\xflfrrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\ffxflrf.exec:\ffxflrf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\5ntnhh.exec:\5ntnhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\bbhhbh.exec:\bbhhbh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\vpjjv.exec:\vpjjv.exe23⤵
- Executes dropped EXE
PID:3528 -
\??\c:\3llfrxl.exec:\3llfrxl.exe24⤵
- Executes dropped EXE
PID:2168 -
\??\c:\httthn.exec:\httthn.exe25⤵
- Executes dropped EXE
PID:3716 -
\??\c:\jjppd.exec:\jjppd.exe26⤵
- Executes dropped EXE
PID:4604 -
\??\c:\xllxllf.exec:\xllxllf.exe27⤵
- Executes dropped EXE
PID:956 -
\??\c:\1rrlfxr.exec:\1rrlfxr.exe28⤵
- Executes dropped EXE
PID:4916 -
\??\c:\bhhbhn.exec:\bhhbhn.exe29⤵
- Executes dropped EXE
PID:2144 -
\??\c:\vpjjj.exec:\vpjjj.exe30⤵
- Executes dropped EXE
PID:5084 -
\??\c:\5jjdp.exec:\5jjdp.exe31⤵
- Executes dropped EXE
PID:588 -
\??\c:\nbttth.exec:\nbttth.exe32⤵
- Executes dropped EXE
PID:3016 -
\??\c:\pdjdd.exec:\pdjdd.exe33⤵
- Executes dropped EXE
PID:4040 -
\??\c:\bnntnn.exec:\bnntnn.exe34⤵
- Executes dropped EXE
PID:2408 -
\??\c:\rfrrfll.exec:\rfrrfll.exe35⤵
- Executes dropped EXE
PID:2576 -
\??\c:\vpjdd.exec:\vpjdd.exe36⤵
- Executes dropped EXE
PID:4552 -
\??\c:\1xffxxr.exec:\1xffxxr.exe37⤵
- Executes dropped EXE
PID:2808 -
\??\c:\htbthb.exec:\htbthb.exe38⤵
- Executes dropped EXE
PID:2552 -
\??\c:\rrlrrrx.exec:\rrlrrrx.exe39⤵
- Executes dropped EXE
PID:3060 -
\??\c:\bhntbh.exec:\bhntbh.exe40⤵
- Executes dropped EXE
PID:4576 -
\??\c:\ddjjj.exec:\ddjjj.exe41⤵
- Executes dropped EXE
PID:2224 -
\??\c:\hbhtnn.exec:\hbhtnn.exe42⤵
- Executes dropped EXE
PID:4128 -
\??\c:\vddvp.exec:\vddvp.exe43⤵
- Executes dropped EXE
PID:2640 -
\??\c:\lrrrfll.exec:\lrrrfll.exe44⤵
- Executes dropped EXE
PID:2388 -
\??\c:\flxxfxx.exec:\flxxfxx.exe45⤵
- Executes dropped EXE
PID:4492 -
\??\c:\nbbtnh.exec:\nbbtnh.exe46⤵
- Executes dropped EXE
PID:4440 -
\??\c:\vjpjd.exec:\vjpjd.exe47⤵
- Executes dropped EXE
PID:1372 -
\??\c:\1jjdp.exec:\1jjdp.exe48⤵
- Executes dropped EXE
PID:2352 -
\??\c:\7rrlxrl.exec:\7rrlxrl.exe49⤵
- Executes dropped EXE
PID:2516 -
\??\c:\rffxrfx.exec:\rffxrfx.exe50⤵
- Executes dropped EXE
PID:4540 -
\??\c:\bttnhb.exec:\bttnhb.exe51⤵
- Executes dropped EXE
PID:3648 -
\??\c:\dvvdp.exec:\dvvdp.exe52⤵
- Executes dropped EXE
PID:180 -
\??\c:\djjdv.exec:\djjdv.exe53⤵
- Executes dropped EXE
PID:4368 -
\??\c:\lrrlxxr.exec:\lrrlxxr.exe54⤵
- Executes dropped EXE
PID:4400 -
\??\c:\xlrxllx.exec:\xlrxllx.exe55⤵
- Executes dropped EXE
PID:856 -
\??\c:\pdjpv.exec:\pdjpv.exe56⤵
- Executes dropped EXE
PID:3948 -
\??\c:\9dpjd.exec:\9dpjd.exe57⤵
- Executes dropped EXE
PID:4928 -
\??\c:\rffxrlf.exec:\rffxrlf.exe58⤵
- Executes dropped EXE
PID:944 -
\??\c:\xlxrrrl.exec:\xlxrrrl.exe59⤵
- Executes dropped EXE
PID:1648 -
\??\c:\btbtbt.exec:\btbtbt.exe60⤵
- Executes dropped EXE
PID:4260 -
\??\c:\bntnhh.exec:\bntnhh.exe61⤵
- Executes dropped EXE
PID:5032 -
\??\c:\vjjdp.exec:\vjjdp.exe62⤵
- Executes dropped EXE
PID:4588 -
\??\c:\xrxrrrr.exec:\xrxrrrr.exe63⤵
- Executes dropped EXE
PID:4276 -
\??\c:\rrllflf.exec:\rrllflf.exe64⤵
- Executes dropped EXE
PID:3112 -
\??\c:\bbttnt.exec:\bbttnt.exe65⤵
- Executes dropped EXE
PID:2012 -
\??\c:\pjvvv.exec:\pjvvv.exe66⤵PID:2816
-
\??\c:\xffxrxx.exec:\xffxrxx.exe67⤵PID:4708
-
\??\c:\5hhhhh.exec:\5hhhhh.exe68⤵PID:4636
-
\??\c:\vpvpj.exec:\vpvpj.exe69⤵PID:1972
-
\??\c:\frxxxff.exec:\frxxxff.exe70⤵PID:2812
-
\??\c:\xrrlffx.exec:\xrrlffx.exe71⤵PID:3856
-
\??\c:\pjvvv.exec:\pjvvv.exe72⤵PID:2140
-
\??\c:\ttbttb.exec:\ttbttb.exe73⤵PID:2016
-
\??\c:\dpdpd.exec:\dpdpd.exe74⤵PID:3392
-
\??\c:\3rfxlrl.exec:\3rfxlrl.exe75⤵PID:3580
-
\??\c:\dpvvv.exec:\dpvvv.exe76⤵PID:1944
-
\??\c:\1llfxfx.exec:\1llfxfx.exe77⤵PID:2020
-
\??\c:\hhttbb.exec:\hhttbb.exe78⤵PID:2364
-
\??\c:\dpdvp.exec:\dpdvp.exe79⤵PID:3520
-
\??\c:\fxrflfx.exec:\fxrflfx.exe80⤵PID:3876
-
\??\c:\7hhnhn.exec:\7hhnhn.exe81⤵PID:2712
-
\??\c:\jdjdv.exec:\jdjdv.exe82⤵PID:1400
-
\??\c:\nhnhbb.exec:\nhnhbb.exe83⤵PID:4796
-
\??\c:\frxxrxx.exec:\frxxrxx.exe84⤵PID:4756
-
\??\c:\thbhnn.exec:\thbhnn.exe85⤵PID:2716
-
\??\c:\3djdv.exec:\3djdv.exe86⤵PID:4856
-
\??\c:\xrxflll.exec:\xrxflll.exe87⤵PID:2928
-
\??\c:\btbtnh.exec:\btbtnh.exe88⤵PID:4668
-
\??\c:\tthhnn.exec:\tthhnn.exe89⤵PID:2360
-
\??\c:\vpdvp.exec:\vpdvp.exe90⤵PID:1332
-
\??\c:\lffxrrl.exec:\lffxrrl.exe91⤵PID:640
-
\??\c:\hbbtnn.exec:\hbbtnn.exe92⤵PID:1052
-
\??\c:\rllfffr.exec:\rllfffr.exe93⤵PID:1624
-
\??\c:\bbntnt.exec:\bbntnt.exe94⤵PID:4292
-
\??\c:\1rrrrrr.exec:\1rrrrrr.exe95⤵PID:1300
-
\??\c:\bttttn.exec:\bttttn.exe96⤵PID:3260
-
\??\c:\ppppj.exec:\ppppj.exe97⤵PID:2452
-
\??\c:\btbbht.exec:\btbbht.exe98⤵PID:2144
-
\??\c:\rrxrllf.exec:\rrxrllf.exe99⤵PID:1236
-
\??\c:\nhnhhb.exec:\nhnhhb.exe100⤵PID:4592
-
\??\c:\5nhbtt.exec:\5nhbtt.exe101⤵PID:1956
-
\??\c:\5xrxxlf.exec:\5xrxxlf.exe102⤵PID:3600
-
\??\c:\vvdjp.exec:\vvdjp.exe103⤵PID:2084
-
\??\c:\ddvdv.exec:\ddvdv.exe104⤵PID:2080
-
\??\c:\3nbnnn.exec:\3nbnnn.exe105⤵PID:636
-
\??\c:\3djjp.exec:\3djjp.exe106⤵PID:3428
-
\??\c:\5ttnhh.exec:\5ttnhh.exe107⤵PID:4956
-
\??\c:\ffrlllr.exec:\ffrlllr.exe108⤵PID:4248
-
\??\c:\jjppj.exec:\jjppj.exe109⤵PID:2656
-
\??\c:\ffffxxx.exec:\ffffxxx.exe110⤵PID:5036
-
\??\c:\jjvvv.exec:\jjvvv.exe111⤵PID:5096
-
\??\c:\tbhttt.exec:\tbhttt.exe112⤵PID:3276
-
\??\c:\dpvdd.exec:\dpvdd.exe113⤵PID:2964
-
\??\c:\lffxlrl.exec:\lffxlrl.exe114⤵PID:3976
-
\??\c:\bthnhb.exec:\bthnhb.exe115⤵PID:3828
-
\??\c:\xlxxrxr.exec:\xlxxrxr.exe116⤵PID:5104
-
\??\c:\dddvv.exec:\dddvv.exe117⤵PID:5080
-
\??\c:\3rxxrrl.exec:\3rxxrrl.exe118⤵PID:1140
-
\??\c:\bhhbtb.exec:\bhhbtb.exe119⤵PID:116
-
\??\c:\5pvvd.exec:\5pvvd.exe120⤵PID:228
-
\??\c:\rllfrrr.exec:\rllfrrr.exe121⤵PID:220
-
\??\c:\9tttnh.exec:\9tttnh.exe122⤵PID:1932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-