Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 09:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe
-
Size
46KB
-
MD5
40ffa477622861421c98bdd9e50e0874
-
SHA1
39b1f04c5f2c04616b81b7148571237eae65ddbf
-
SHA256
612bd6f0c9320e3d22b3d5cc363f823c7cb60305b00efb0fa6c83a34649b2470
-
SHA512
c989900505b28b05c1b05f488b0d0f47e1d8fe08c05ebba414bc9124fba0603834c46af580d8875e472be7a1180b54c5a442b2548c32981195110b1712327e1a
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRjh2Vb:nSgy19JSVO1ONn511/tivXZzOmRF2VGo
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2628 hntnhn.exe 4888 xfxxlll.exe 2524 pjjdv.exe 1036 nhbbtt.exe 4464 btnntb.exe 2860 xrlrxff.exe 2956 bttnbb.exe 4940 rffxrrl.exe 4168 jpvvp.exe 4212 llrrlxx.exe 4008 nbnnhh.exe 3176 rfxrlxl.exe 4892 lfrxffl.exe 2700 jvjjj.exe 5080 nnbhbn.exe 3536 dpddv.exe 400 bhhhhb.exe 3216 jpvvv.exe 3968 3rfflrf.exe 736 bbbbhb.exe 2360 vvdjv.exe 1544 ffflrxf.exe 5040 tbbhbh.exe 3396 jpppv.exe 2976 rrfxxxf.exe 2944 nnbbhn.exe 3648 lfrlrlx.exe 2908 9hhhbb.exe 5024 vvjpv.exe 5056 lllllfl.exe 1424 frxxrxr.exe 3132 dvdpv.exe 1892 bthhbh.exe 1936 nhnnnt.exe 3656 xrrrffr.exe 4752 tbnnhh.exe 4552 ntbttn.exe 4944 vpjdp.exe 4088 nhhhnn.exe 2240 vjppj.exe 4392 lfllxxl.exe 1716 ddddd.exe 3588 lfrllrx.exe 3680 bthhbb.exe 1376 rfxxrxr.exe 4448 nhbbtb.exe 2028 7fllxfl.exe 3300 nnthhn.exe 4716 jpvvp.exe 2860 rlxlrll.exe 2956 ntnbhh.exe 2692 9vjdd.exe 2952 xrlfxll.exe 4168 1nbbhn.exe 3864 lrllrxl.exe 4212 hhttbb.exe 4364 9pjjd.exe 820 5rxlllf.exe 1304 9hhbbt.exe 2740 djpjj.exe 4184 djdvd.exe 752 nhnttt.exe 2736 pvvpd.exe 4704 5vpvj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 2628 4088 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 82 PID 4088 wrote to memory of 2628 4088 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 82 PID 4088 wrote to memory of 2628 4088 40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe 82 PID 2628 wrote to memory of 4888 2628 hntnhn.exe 84 PID 2628 wrote to memory of 4888 2628 hntnhn.exe 84 PID 2628 wrote to memory of 4888 2628 hntnhn.exe 84 PID 4888 wrote to memory of 2524 4888 xfxxlll.exe 86 PID 4888 wrote to memory of 2524 4888 xfxxlll.exe 86 PID 4888 wrote to memory of 2524 4888 xfxxlll.exe 86 PID 2524 wrote to memory of 1036 2524 pjjdv.exe 87 PID 2524 wrote to memory of 1036 2524 pjjdv.exe 87 PID 2524 wrote to memory of 1036 2524 pjjdv.exe 87 PID 1036 wrote to memory of 4464 1036 nhbbtt.exe 88 PID 1036 wrote to memory of 4464 1036 nhbbtt.exe 88 PID 1036 wrote to memory of 4464 1036 nhbbtt.exe 88 PID 4464 wrote to memory of 2860 4464 btnntb.exe 89 PID 4464 wrote to memory of 2860 4464 btnntb.exe 89 PID 4464 wrote to memory of 2860 4464 btnntb.exe 89 PID 2860 wrote to memory of 2956 2860 xrlrxff.exe 90 PID 2860 wrote to memory of 2956 2860 xrlrxff.exe 90 PID 2860 wrote to memory of 2956 2860 xrlrxff.exe 90 PID 2956 wrote to memory of 4940 2956 bttnbb.exe 91 PID 2956 wrote to memory of 4940 2956 bttnbb.exe 91 PID 2956 wrote to memory of 4940 2956 bttnbb.exe 91 PID 4940 wrote to memory of 4168 4940 rffxrrl.exe 92 PID 4940 wrote to memory of 4168 4940 rffxrrl.exe 92 PID 4940 wrote to memory of 4168 4940 rffxrrl.exe 92 PID 4168 wrote to memory of 4212 4168 jpvvp.exe 93 PID 4168 wrote to memory of 4212 4168 jpvvp.exe 93 PID 4168 wrote to memory of 4212 4168 jpvvp.exe 93 PID 4212 wrote to memory of 4008 4212 llrrlxx.exe 94 PID 4212 wrote to memory of 4008 4212 llrrlxx.exe 94 PID 4212 wrote to memory of 4008 4212 llrrlxx.exe 94 PID 4008 wrote to memory of 3176 4008 nbnnhh.exe 96 PID 4008 wrote to memory of 3176 4008 nbnnhh.exe 96 PID 4008 wrote to memory of 3176 4008 nbnnhh.exe 96 PID 3176 wrote to memory of 4892 3176 rfxrlxl.exe 98 PID 3176 wrote to memory of 4892 3176 rfxrlxl.exe 98 PID 3176 wrote to memory of 4892 3176 rfxrlxl.exe 98 PID 4892 wrote to memory of 2700 4892 lfrxffl.exe 99 PID 4892 wrote to memory of 2700 4892 lfrxffl.exe 99 PID 4892 wrote to memory of 2700 4892 lfrxffl.exe 99 PID 2700 wrote to memory of 5080 2700 jvjjj.exe 100 PID 2700 wrote to memory of 5080 2700 jvjjj.exe 100 PID 2700 wrote to memory of 5080 2700 jvjjj.exe 100 PID 5080 wrote to memory of 3536 5080 nnbhbn.exe 102 PID 5080 wrote to memory of 3536 5080 nnbhbn.exe 102 PID 5080 wrote to memory of 3536 5080 nnbhbn.exe 102 PID 3536 wrote to memory of 400 3536 dpddv.exe 103 PID 3536 wrote to memory of 400 3536 dpddv.exe 103 PID 3536 wrote to memory of 400 3536 dpddv.exe 103 PID 400 wrote to memory of 3216 400 bhhhhb.exe 104 PID 400 wrote to memory of 3216 400 bhhhhb.exe 104 PID 400 wrote to memory of 3216 400 bhhhhb.exe 104 PID 3216 wrote to memory of 3968 3216 jpvvv.exe 105 PID 3216 wrote to memory of 3968 3216 jpvvv.exe 105 PID 3216 wrote to memory of 3968 3216 jpvvv.exe 105 PID 3968 wrote to memory of 736 3968 3rfflrf.exe 106 PID 3968 wrote to memory of 736 3968 3rfflrf.exe 106 PID 3968 wrote to memory of 736 3968 3rfflrf.exe 106 PID 736 wrote to memory of 2360 736 bbbbhb.exe 107 PID 736 wrote to memory of 2360 736 bbbbhb.exe 107 PID 736 wrote to memory of 2360 736 bbbbhb.exe 107 PID 2360 wrote to memory of 1544 2360 vvdjv.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40ffa477622861421c98bdd9e50e0874_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\hntnhn.exec:\hntnhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\xfxxlll.exec:\xfxxlll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\pjjdv.exec:\pjjdv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\nhbbtt.exec:\nhbbtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\btnntb.exec:\btnntb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\xrlrxff.exec:\xrlrxff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\bttnbb.exec:\bttnbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\rffxrrl.exec:\rffxrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\jpvvp.exec:\jpvvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
\??\c:\llrrlxx.exec:\llrrlxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\nbnnhh.exec:\nbnnhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\rfxrlxl.exec:\rfxrlxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
\??\c:\lfrxffl.exec:\lfrxffl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\jvjjj.exec:\jvjjj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\nnbhbn.exec:\nnbhbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\dpddv.exec:\dpddv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\bhhhhb.exec:\bhhhhb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\jpvvv.exec:\jpvvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\3rfflrf.exec:\3rfflrf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\bbbbhb.exec:\bbbbhb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\vvdjv.exec:\vvdjv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\ffflrxf.exec:\ffflrxf.exe23⤵
- Executes dropped EXE
PID:1544 -
\??\c:\tbbhbh.exec:\tbbhbh.exe24⤵
- Executes dropped EXE
PID:5040 -
\??\c:\jpppv.exec:\jpppv.exe25⤵
- Executes dropped EXE
PID:3396 -
\??\c:\rrfxxxf.exec:\rrfxxxf.exe26⤵
- Executes dropped EXE
PID:2976 -
\??\c:\nnbbhn.exec:\nnbbhn.exe27⤵
- Executes dropped EXE
PID:2944 -
\??\c:\lfrlrlx.exec:\lfrlrlx.exe28⤵
- Executes dropped EXE
PID:3648 -
\??\c:\9hhhbb.exec:\9hhhbb.exe29⤵
- Executes dropped EXE
PID:2908 -
\??\c:\vvjpv.exec:\vvjpv.exe30⤵
- Executes dropped EXE
PID:5024 -
\??\c:\lllllfl.exec:\lllllfl.exe31⤵
- Executes dropped EXE
PID:5056 -
\??\c:\frxxrxr.exec:\frxxrxr.exe32⤵
- Executes dropped EXE
PID:1424 -
\??\c:\dvdpv.exec:\dvdpv.exe33⤵
- Executes dropped EXE
PID:3132 -
\??\c:\bthhbh.exec:\bthhbh.exe34⤵
- Executes dropped EXE
PID:1892 -
\??\c:\nhnnnt.exec:\nhnnnt.exe35⤵
- Executes dropped EXE
PID:1936 -
\??\c:\xrrrffr.exec:\xrrrffr.exe36⤵
- Executes dropped EXE
PID:3656 -
\??\c:\tbnnhh.exec:\tbnnhh.exe37⤵
- Executes dropped EXE
PID:4752 -
\??\c:\djppp.exec:\djppp.exe38⤵PID:1736
-
\??\c:\ntbttn.exec:\ntbttn.exe39⤵
- Executes dropped EXE
PID:4552 -
\??\c:\vpjdp.exec:\vpjdp.exe40⤵
- Executes dropped EXE
PID:4944 -
\??\c:\nhhhnn.exec:\nhhhnn.exe41⤵
- Executes dropped EXE
PID:4088 -
\??\c:\vjppj.exec:\vjppj.exe42⤵
- Executes dropped EXE
PID:2240 -
\??\c:\lfllxxl.exec:\lfllxxl.exe43⤵
- Executes dropped EXE
PID:4392 -
\??\c:\ddddd.exec:\ddddd.exe44⤵
- Executes dropped EXE
PID:1716 -
\??\c:\lfrllrx.exec:\lfrllrx.exe45⤵
- Executes dropped EXE
PID:3588 -
\??\c:\bthhbb.exec:\bthhbb.exe46⤵
- Executes dropped EXE
PID:3680 -
\??\c:\rfxxrxr.exec:\rfxxrxr.exe47⤵
- Executes dropped EXE
PID:1376 -
\??\c:\nhbbtb.exec:\nhbbtb.exe48⤵
- Executes dropped EXE
PID:4448 -
\??\c:\7fllxfl.exec:\7fllxfl.exe49⤵
- Executes dropped EXE
PID:2028 -
\??\c:\nnthhn.exec:\nnthhn.exe50⤵
- Executes dropped EXE
PID:3300 -
\??\c:\jpvvp.exec:\jpvvp.exe51⤵
- Executes dropped EXE
PID:4716 -
\??\c:\rlxlrll.exec:\rlxlrll.exe52⤵
- Executes dropped EXE
PID:2860 -
\??\c:\ntnbhh.exec:\ntnbhh.exe53⤵
- Executes dropped EXE
PID:2956 -
\??\c:\9vjdd.exec:\9vjdd.exe54⤵
- Executes dropped EXE
PID:2692 -
\??\c:\xrlfxll.exec:\xrlfxll.exe55⤵
- Executes dropped EXE
PID:2952 -
\??\c:\1nbbhn.exec:\1nbbhn.exe56⤵
- Executes dropped EXE
PID:4168 -
\??\c:\lrllrxl.exec:\lrllrxl.exe57⤵
- Executes dropped EXE
PID:3864 -
\??\c:\hhttbb.exec:\hhttbb.exe58⤵
- Executes dropped EXE
PID:4212 -
\??\c:\9pjjd.exec:\9pjjd.exe59⤵
- Executes dropped EXE
PID:4364 -
\??\c:\5rxlllf.exec:\5rxlllf.exe60⤵
- Executes dropped EXE
PID:820 -
\??\c:\9hhbbt.exec:\9hhbbt.exe61⤵
- Executes dropped EXE
PID:1304 -
\??\c:\djpjj.exec:\djpjj.exe62⤵
- Executes dropped EXE
PID:2740 -
\??\c:\djdvd.exec:\djdvd.exe63⤵
- Executes dropped EXE
PID:4184 -
\??\c:\nhnttt.exec:\nhnttt.exe64⤵
- Executes dropped EXE
PID:752 -
\??\c:\pvvpd.exec:\pvvpd.exe65⤵
- Executes dropped EXE
PID:2736 -
\??\c:\5vpvj.exec:\5vpvj.exe66⤵
- Executes dropped EXE
PID:4704 -
\??\c:\lflfllx.exec:\lflfllx.exe67⤵PID:912
-
\??\c:\3tbbhh.exec:\3tbbhh.exe68⤵PID:4368
-
\??\c:\1jpjd.exec:\1jpjd.exe69⤵PID:2608
-
\??\c:\rllfrrr.exec:\rllfrrr.exe70⤵PID:2300
-
\??\c:\btnhnn.exec:\btnhnn.exe71⤵PID:1000
-
\??\c:\vpvvj.exec:\vpvvj.exe72⤵PID:1660
-
\??\c:\9ffxlrl.exec:\9ffxlrl.exe73⤵PID:4256
-
\??\c:\nhbbtt.exec:\nhbbtt.exe74⤵PID:2344
-
\??\c:\nhtthn.exec:\nhtthn.exe75⤵PID:4688
-
\??\c:\dpjdd.exec:\dpjdd.exe76⤵PID:4844
-
\??\c:\thnnth.exec:\thnnth.exe77⤵PID:4224
-
\??\c:\5pppd.exec:\5pppd.exe78⤵PID:4900
-
\??\c:\jjvvj.exec:\jjvvj.exe79⤵PID:4876
-
\??\c:\fxrlllx.exec:\fxrlllx.exe80⤵PID:3216
-
\??\c:\1vppp.exec:\1vppp.exe81⤵PID:4744
-
\??\c:\thnnbb.exec:\thnnbb.exe82⤵PID:3992
-
\??\c:\vvppd.exec:\vvppd.exe83⤵PID:1972
-
\??\c:\htthnh.exec:\htthnh.exe84⤵PID:3360
-
\??\c:\fxxxlll.exec:\fxxxlll.exe85⤵PID:1544
-
\??\c:\btttnt.exec:\btttnt.exe86⤵PID:1120
-
\??\c:\flrlfxx.exec:\flrlfxx.exe87⤵PID:4608
-
\??\c:\ttnnbb.exec:\ttnnbb.exe88⤵PID:2392
-
\??\c:\jjjvj.exec:\jjjvj.exe89⤵PID:2976
-
\??\c:\ttnhht.exec:\ttnhht.exe90⤵PID:1132
-
\??\c:\lrfxxxx.exec:\lrfxxxx.exe91⤵PID:4880
-
\??\c:\9hnhtt.exec:\9hnhtt.exe92⤵PID:1976
-
\??\c:\xrfrlll.exec:\xrfrlll.exe93⤵PID:2908
-
\??\c:\bbhtbb.exec:\bbhtbb.exe94⤵PID:968
-
\??\c:\3pppj.exec:\3pppj.exe95⤵PID:2820
-
\??\c:\thbhnn.exec:\thbhnn.exe96⤵PID:764
-
\??\c:\jjpdd.exec:\jjpdd.exe97⤵PID:2780
-
\??\c:\fflffxx.exec:\fflffxx.exe98⤵PID:2920
-
\??\c:\jvddj.exec:\jvddj.exe99⤵PID:3524
-
\??\c:\xxxxxff.exec:\xxxxxff.exe100⤵PID:3952
-
\??\c:\tnnbhb.exec:\tnnbhb.exe101⤵PID:1988
-
\??\c:\jjjdd.exec:\jjjdd.exe102⤵PID:1736
-
\??\c:\llxxxxf.exec:\llxxxxf.exe103⤵PID:3932
-
\??\c:\ttnbbh.exec:\ttnbbh.exe104⤵PID:2668
-
\??\c:\ttntnt.exec:\ttntnt.exe105⤵PID:3612
-
\??\c:\jppjj.exec:\jppjj.exe106⤵PID:2084
-
\??\c:\1jjdd.exec:\1jjdd.exe107⤵PID:4584
-
\??\c:\xfxfflx.exec:\xfxfflx.exe108⤵PID:1416
-
\??\c:\5dvdj.exec:\5dvdj.exe109⤵PID:4888
-
\??\c:\rrrxrff.exec:\rrrxrff.exe110⤵PID:3596
-
\??\c:\5ttnnb.exec:\5ttnnb.exe111⤵PID:4828
-
\??\c:\dpvjd.exec:\dpvjd.exe112⤵PID:4052
-
\??\c:\lfrxfll.exec:\lfrxfll.exe113⤵PID:2612
-
\??\c:\bnnhhh.exec:\bnnhhh.exe114⤵PID:4764
-
\??\c:\lflxlxx.exec:\lflxlxx.exe115⤵PID:2128
-
\??\c:\nhhtnt.exec:\nhhtnt.exe116⤵PID:2520
-
\??\c:\7vdvd.exec:\7vdvd.exe117⤵PID:2948
-
\??\c:\lffxlfx.exec:\lffxlfx.exe118⤵PID:2988
-
\??\c:\1bhbnt.exec:\1bhbnt.exe119⤵PID:3852
-
\??\c:\jpjpv.exec:\jpjpv.exe120⤵PID:1860
-
\??\c:\bhnbbt.exec:\bhnbbt.exe121⤵PID:2144
-
\??\c:\jjjjj.exec:\jjjjj.exe122⤵PID:2264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-