Analysis

  • max time kernel
    148s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 18:26

General

  • Target

    8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe

  • Size

    12.6MB

  • MD5

    8b5b7d805218a6e2b4cc2f6e577baeb5

  • SHA1

    0e44f1cff127887d956bd62be1b7a416b50bc8b2

  • SHA256

    611434b69ac665d2dd87a84f27534ff3911529c88d140498b0cae217d848c248

  • SHA512

    e81ab24e26f3a455903bec752124299eeb9b97cd64f66610c1ee39ed3903144725ba040019ebe057dd8a939ee66aea65ebc9732719a85eb65ee0d1aa4b612822

  • SSDEEP

    393216:hRgffoY0zxtzh4Xn9dOB2NxxL1+xy46Dp:hifQBKvOBKX+y46d

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\AppData\Local\Temp\is-U3E9E.tmp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-U3E9E.tmp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp" /SL5="$50220,12916863,95232,C:\Users\Admin\AppData\Local\Temp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      PID:6016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-U3E9E.tmp\8b5b7d805218a6e2b4cc2f6e577baeb5_JaffaCakes118.tmp

    Filesize

    733KB

    MD5

    7acaaba4c7d7f272e4b2b57bfda84db8

    SHA1

    41c734d53b9ab1d34931e542ff837870cb0ef931

    SHA256

    f8e70f25e8b9f49ee6ac0874ec27749f80fabaf73980e7629ea193329b903499

    SHA512

    de9c89b60ed9f049233e9513b21e342edf27e7c797b0264df9d1fef61792d9f8b4b3ca39b6850196ea6bdb0dad7b6bf6606d3d078489462c5de67c0a48703603

  • memory/4356-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4356-2-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB

  • memory/4356-8-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/6016-7-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/6016-9-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB