Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe
-
Size
12.6MB
-
MD5
8b5b7d805218a6e2b4cc2f6e577baeb5
-
SHA1
0e44f1cff127887d956bd62be1b7a416b50bc8b2
-
SHA256
611434b69ac665d2dd87a84f27534ff3911529c88d140498b0cae217d848c248
-
SHA512
e81ab24e26f3a455903bec752124299eeb9b97cd64f66610c1ee39ed3903144725ba040019ebe057dd8a939ee66aea65ebc9732719a85eb65ee0d1aa4b612822
-
SSDEEP
393216:hRgffoY0zxtzh4Xn9dOB2NxxL1+xy46Dp:hifQBKvOBKX+y46d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2220 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp -
Loads dropped DLL 1 IoCs
pid Process 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28 PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28 PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28 PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28 PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28 PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28 PID 1148 wrote to memory of 2220 1148 8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\is-059PK.tmp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-059PK.tmp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp" /SL5="$80122,12916863,95232,C:\Users\Admin\AppData\Local\Temp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
733KB
MD57acaaba4c7d7f272e4b2b57bfda84db8
SHA141c734d53b9ab1d34931e542ff837870cb0ef931
SHA256f8e70f25e8b9f49ee6ac0874ec27749f80fabaf73980e7629ea193329b903499
SHA512de9c89b60ed9f049233e9513b21e342edf27e7c797b0264df9d1fef61792d9f8b4b3ca39b6850196ea6bdb0dad7b6bf6606d3d078489462c5de67c0a48703603