Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe
-
Size
17.4MB
-
MD5
7782f29214c572cac584254d4063c0b4
-
SHA1
b9bea15d9986975c47e92cbbd7e0bd39f502ac63
-
SHA256
b010f6cef75c33e294d289c28c0b3d407df9277e9c4abf05f8b62ccd9912f9dc
-
SHA512
cfd276bc941ae6dcd0ed628a3c6267020242d3a239b00051d913e03c34f1304b0a124f20423520260d6cf11263c8db661106575f7bd69b79d6a93c62478cb5fb
-
SSDEEP
393216:NNWRRs7WBhKvnPsNNkPpjHTPuPw6q4o8G3hgdsQ6lLe8fZc0oP:NYk7uofPsHkPhHQlq47GRq60/HP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 7782f29214c572cac584254d4063c0b4_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2056 3040 7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe 91 PID 3040 wrote to memory of 2056 3040 7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe 91 PID 3040 wrote to memory of 2056 3040 7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\is-J9CE3.tmp\7782f29214c572cac584254d4063c0b4_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-J9CE3.tmp\7782f29214c572cac584254d4063c0b4_JaffaCakes118.tmp" /SL5="$90116,17910329,57856,C:\Users\Admin\AppData\Local\Temp\7782f29214c572cac584254d4063c0b4_JaffaCakes118.exe"2⤵
- Executes dropped EXE
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3572 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:3860
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD56a4494ccea512f61f234d0e05c4f79a1
SHA16a884288ae686fe35c996ffbb5bf4f098848192c
SHA25687832cf953f5c8f5aafc1391ea63a01fc5f2bef4320870f0984b67ea5aed5ce1
SHA512d0271d3a0a3604f86383d7e6a7832e788fc1f2dbd6caa331e8b47fdea0bfcb7a03fdefed793cb4c0f9d9d8bc5862c3b68ba16b4cfaabdf508cfc3db08940a789