Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe
Resource
win7-20240215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe
-
Size
796KB
-
MD5
3ae226316a769020947aaa7dbbfe8e86
-
SHA1
3e8502ab58ed7dc523a68b43db3474f44d0625ce
-
SHA256
235400db0c44cded82c99e87c7504005985f223aa777388325a38255134f2276
-
SHA512
62dda5586d71816f571b42b28009079ada217b033811df54b35975c7478ca6d75cbaa861421f0c864c1b12db3ab965fb96015f3bc772a10775f7ac4068223c6a
-
SSDEEP
12288:wszx/K5ElQDIjNQOe9QkOPOvw0OoYhBhbNvAO+3lZC4E5YRVAKUeIV:L9/DOTNO2vJQB7ADlZC4KY8V
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1540 wrote to memory of 380 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 28 PID 1540 wrote to memory of 380 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 28 PID 1540 wrote to memory of 380 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 28 PID 1540 wrote to memory of 380 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 28 PID 1540 wrote to memory of 2936 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 29 PID 1540 wrote to memory of 2936 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 29 PID 1540 wrote to memory of 2936 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 29 PID 1540 wrote to memory of 2936 1540 3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exestart2⤵PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\3ae226316a769020947aaa7dbbfe8e86_JaffaCakes118.exewatch2⤵PID:2936
-