Analysis
-
max time kernel
129s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe
-
Size
263KB
-
MD5
8b10cbc0837685bd1154774495a3793b
-
SHA1
5a26798ace5b79316976122bb6e62364acef8f05
-
SHA256
d5caafc69b97bea7eecb9f562faff45ba8bfa2e618f9ee081d19a0ac172c005a
-
SHA512
32746427401b1fc809d59824bf7b0ef1969f46cf8e26c522dff3cf10bb555701417ec1f0606657860f8560ecca993311c5a36d92dcc737eb156b1ec3718dc54f
-
SSDEEP
6144:bRgym92YGB+40vPLGPAJQntXC1WzEk/UKmODwwPASrDl:d6fu+40vPFQntSgzvDwUrB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 winvnc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2188 3016 8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe 82 PID 3016 wrote to memory of 2188 3016 8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe 82 PID 3016 wrote to memory of 2188 3016 8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b10cbc0837685bd1154774495a3793b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\7zS41FA.tmp\winvnc.exe.\winvnc.exe2⤵
- Executes dropped EXE
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56ce6e5fcf1a56b80f4ffa6f685d4329d
SHA191780868c241e83754003855407805c0cda20254
SHA2566fcc92e281d25569d300297ef79a5796bc5e0c226aa35624dd6a9f38b8413402
SHA5127af21c8840f56c5ded22161504dd3d6c282ad83a0fb1f711fccfc7d87676de3036120e60e2c0e57fb998a0dcfe512950d3f16e0bdcb493d37a681f31b8cb399f
-
Filesize
2KB
MD5d88b7fd99a66eed7aa7f22ad9d9371c1
SHA183791620bdb20cb9a55c7bd4f00fc41a375bd77c
SHA256cd6a4095867440809f6e81fe7602c2cd59932359adc416a800b9018dc4ea76c6
SHA512970b0424b1e61aba43ef89c67043c6d710ffb76b0ce8f70d66118051261e1178917c080454f8600afe5451365879d5d19b012a97b27e9cfda6b1b007ce43d6c2
-
Filesize
35KB
MD58e0ca1910a8c92f81bcc19be5fc54a36
SHA176673e357006d854894794fbf1677ec6c9845bd1
SHA256f9838e72f87083f1f5c974787c83f8ab11b1cefea2eec2a0ad29f76224f0ac61
SHA51205bb5a130904f6736942d0409ec4dd8de2b501de2289f8ec275a70418537eb8261aa8abeaf748a32186ba52e552a3344e07f1b15fb60fd4567d90a633f361de2
-
Filesize
269KB
MD58ff25e4b8c0a4aec49a005bf1ed2e613
SHA1ef4093f398118522835baffbeb39745b2df8dcda
SHA256860777b8000eca16cdd2dd0ef1d26e0d237f784af99cdc44830f894470e53907
SHA512bce97043bfa01ccedf0901e3beafcf782934d9c2fdb2424cf7081cfc77edb6a65150701d74490d8764a4e8b5e150f03e61388efd99f9099f2bdc921150dd8037