Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe
-
Size
755KB
-
MD5
6f207716d59a044061b4f66d49d0e28b
-
SHA1
2b28650f7a8c885d2245ceb6b76edc8eec851ee5
-
SHA256
2345079a4e2b0ed3e708a13176213ff998f7a5e5e8a9f278eaa4f66631598ff2
-
SHA512
e003780a7cfda1741bcc4d1da6fce125ddafc59f006a0dfa629586e071b1fd5bde19e703b62a230f6945c69769d8a1a518d3cfc841a3bcb9f2a7e1813b15796d
-
SSDEEP
12288:ZNhBJitWYoOOIpkYQJsYwA8/BLDjoFrxzebIz+WxxBVDGYP3IW/:tBgcY8DlBODUzzEIdxxjDdP4W/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 2156 setup.exe 2156 setup.exe 2156 setup.exe 2156 setup.exe 2156 setup.exe 2156 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2156 2748 6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f207716d59a044061b4f66d49d0e28b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD56f207716d59a044061b4f66d49d0e28b
SHA12b28650f7a8c885d2245ceb6b76edc8eec851ee5
SHA2562345079a4e2b0ed3e708a13176213ff998f7a5e5e8a9f278eaa4f66631598ff2
SHA512e003780a7cfda1741bcc4d1da6fce125ddafc59f006a0dfa629586e071b1fd5bde19e703b62a230f6945c69769d8a1a518d3cfc841a3bcb9f2a7e1813b15796d