Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 07:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e625179be9cd699e083be99f675559b_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3e625179be9cd699e083be99f675559b_JaffaCakes118.exe
-
Size
890KB
-
MD5
3e625179be9cd699e083be99f675559b
-
SHA1
fa6929c60858cb0fc881936b471aa0b8135f0981
-
SHA256
e42321f773a5f8174447c076215512256e66f6eb444aa5bfc606b202ea3f5cc2
-
SHA512
fb13b898409fdb31713fd4ecca3670e4abac4b832615d45f19351116bebd2dabd612e6e374054f21995479552e3232c8fb764b7df284d884c666a28a3c534a36
-
SSDEEP
12288:tSXVZYRS9BB/1qfhGOOk0Cpya8BUf2T20kWb/rI2H+1PKCN8ZeIimEHJCRzy0dTZ:0XB6f81Cpyd+Ps81V/0Xt+6L0/lY
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2128-2-0x0000000000C00000-0x0000000000C7C000-memory.dmp family_zgrat_v1 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3040 2128 3e625179be9cd699e083be99f675559b_JaffaCakes118.exe 28 PID 2128 wrote to memory of 3040 2128 3e625179be9cd699e083be99f675559b_JaffaCakes118.exe 28 PID 2128 wrote to memory of 3040 2128 3e625179be9cd699e083be99f675559b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e625179be9cd699e083be99f675559b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e625179be9cd699e083be99f675559b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8602⤵PID:3040
-