Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe
-
Size
436KB
-
MD5
882e2c2b51650e2fec7529ae437fc3a5
-
SHA1
5abc069eaf62469f4032e0cdf46efcc1b1a61fe0
-
SHA256
b1ebdd1e1d490919894d339d4d512ef25f382d18a77557fd28785ef4fcd2afdd
-
SHA512
0ebbb91c318642189d65ca3fcac8565dbed80cd030af801aa1b129e3380b0441bdcba42abc5c1c90b23f3637a223718ee548e1da350427d25cdaa2653ce5bc33
-
SSDEEP
12288:NSwD3oXqDZY8Ah9YNQK20hjrmDfcX63iuO9SdqED8fAmYkZe3K0+6Q3tnf39yo1y:MEF2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exepid process 2660 883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exe -
Loads dropped DLL 1 IoCs
Processes:
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exepid process 2480 882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exedescription pid process target process PID 2480 wrote to memory of 2660 2480 882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe 883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exe PID 2480 wrote to memory of 2660 2480 882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe 883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exe PID 2480 wrote to memory of 2660 2480 882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe 883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exe PID 2480 wrote to memory of 2660 2480 882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe 883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\882e2c2b51650e2fec7529ae437fc3a5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\localservice\883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\localservice\883f3c3b62660f3gfc7639af547gc4a6_JaggaCalfs228.exe2⤵
- Executes dropped EXE
PID:2660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5882e2c2b51650e2fec7529ae437fc3a5
SHA15abc069eaf62469f4032e0cdf46efcc1b1a61fe0
SHA256b1ebdd1e1d490919894d339d4d512ef25f382d18a77557fd28785ef4fcd2afdd
SHA5120ebbb91c318642189d65ca3fcac8565dbed80cd030af801aa1b129e3380b0441bdcba42abc5c1c90b23f3637a223718ee548e1da350427d25cdaa2653ce5bc33