Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
7ed7096165f46290cac4f0f170e54e30
-
SHA1
e11596b2fc05caeffafa537cd784b4d51d8ff99d
-
SHA256
ca4f5c21b8568d821ee22fc934aa78abb16bba38da285dc2b0da0e4f9b0bc80c
-
SHA512
c6b586244c5e4d3a63a533cd5cec713094380d6bba1b30b3361043ffbffdaa9432b48513f0288e45839b0f0b20053910fdd4a74e364b953a62d61387aaf031db
-
SSDEEP
49152:1siDVKWcZ+srXaMqKQBEoN6sUi1uEMd2zIFqyop:5cZjPloN6sUq2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp -
Loads dropped DLL 10 IoCs
pid Process 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp 1708 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28 PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28 PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28 PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28 PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28 PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28 PID 2288 wrote to memory of 1708 2288 7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\is-54M9I.tmp\7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-54M9I.tmp\7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.tmp" /SL5="$70122,1913662,214528,C:\Users\Admin\AppData\Local\Temp\7ed7096165f46290cac4f0f170e54e30_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5cb33ff3204491fab4686d61710d3ea24
SHA132b89dbe761f7486c68d1767563d8ad1f08d99ef
SHA256ff652f10ac6dbf8d4965f6624339c67e02715cf499ad8b26c1a683bd503e4136
SHA512ed888d1f3cb5865217f4952edcc5cc592dac9f4efc1ef44b8de960425f49f6155cd3f9b663dd7b9b834210cc10c99119cb27b9a97cd747cf7991812b1d0e29d8
-
Filesize
3.6MB
MD59db36dabb0411da19ff18f654a3132ac
SHA116830b4aa8c74a272e29d5e29091c7b4ff8279ae
SHA256ee812c076f4873b5ff0078740a19497c5532d31d4eb38e352f2e7c349b1933f9
SHA512a90965550e4230f8c25ca6e72a82f2ee4f85387359b5e04866021de6543a5dba78e04a725a998eab84b985748d03bb96f52652afce8d7323a69e3399ac2d0203
-
Filesize
2.7MB
MD57f23997560c0469ec0b62440f423be6a
SHA163e82719205cb9951cba85cc40da43c22cb292fa
SHA256023d0b1bab8a17905e7ce90a985b4097db8bf76cb83e4ddcafe4d28b5084ce20
SHA51223df8d4f0152e4aa2b163ddb55f4b44c782a87e36a8c9a89eed8711732c857f99a21f906605c225821c917d73271890a886b087746fee1976fec29d180bbfae3
-
Filesize
117KB
MD58e49aa85a7da6cd70eb7c15e4c828b4e
SHA1973cdc9c10e71c0b07ef2d70a9fc30bb8cc72426
SHA25657c40a9d2e592d968daa0f092abfa7abe2b41c47eb718adb770bd6930ec0dba4
SHA512c7e0107d835bd83c7dbd666b5c768befbe303bbb126cbac905aa0c6bb91bcd0c99f03f780606fd8e23ef30b1976452d98f792107e7ed1dd6e630a99f148567f1
-
Filesize
351KB
MD5f33f723b7cbe4839518abcf840b514ac
SHA13bcc0d5f0614199e844050f16dac40cb26e564de
SHA256874b45e494834b26a26b93cc8aa211e08aaf561cad149a25ded8418c5a59aa2c
SHA512e7f7e1e477a8aaae039502825fdc2b329c6d1a9e2e081ecaae16aa265981cc8b23279cc2da3d81d65648e73b6fe0d5f27a5faa777cc9e717182903581f2d118d
-
Filesize
291KB
MD52902d6187193278e2c57848db9d3f8b7
SHA1fb4beb9474cf8b6d6b251faeb23afb68e16568d4
SHA2569c358e08a19ac5d3e86321cf1b742cf06fadccaea48b00cfdd56fff7a3c9078b
SHA512c2bdbed0aaa6093ed575c9098131de5c69418274c91032a23c91d0c96473a7d969891e5bc699a912c29a729e26997bda9d7ed484a13f4d3050061d4ab6af7e1b
-
Filesize
177KB
MD5b61daffc0ce79515781319460f43bde9
SHA12bf3d2f0a88ec6f27fbb4eab507ec5d7b3431446
SHA2566969542e2233694b05b7267b6b78ee7f47e910c1ce170f901d05e48fe34d9ff6
SHA512ba65ad680d7e214c9d2ae963e2e03664b1eacd1ba72a8fd657edd3c4d9ca64da4f68e85dc19d8e6a8719ee59218c5c649b159ba72f0102cecb5eec1e04e83f32
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
165KB
MD54af80b8a27320d5685f7b255efc7c2f3
SHA1f0819580166790b745e4974c673d438ccd5a263f
SHA256592331029546d61a2be697144840fb04a84bffb95608b1d2862fca5b8dabc357
SHA512a1f719992f69e6c3f8f359259900d9a587cc02037812d8f4b8074a062c1efb68f274ef041c7898851580c207f4ab1fefd6c40f29748b4527283553de366ee77b