Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
9847b8fb6f07a309481040d71bf50a2e
-
SHA1
4b6b2b87bd874834c7ab1fcb4ba27fc43588ed73
-
SHA256
604e3701ee9c12ccc9fe6addee3f778fe418ce7e1ff55e47b8d1838b4ff11384
-
SHA512
ff0d35cbcca0bf5f99d7d7cf5f4786b0b230e1cf86166b8d0c06e35cc12486af889f540a05b41e21a83f245a3c451da0758445f3355195d5aea6bb8934b5340e
-
SSDEEP
49152:d75tM5lcmO+X5w47RNqpCT0gD3QmOvlQEtm6E6Fmh1tzpjBMq4+awoV/V:F5zD+X5xNQC0jDvlgUFYh3dpro9V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1856 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp -
Loads dropped DLL 3 IoCs
pid Process 1856 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp 1856 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp 1856 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1856 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 1856 3556 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe 90 PID 3556 wrote to memory of 1856 3556 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe 90 PID 3556 wrote to memory of 1856 3556 9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\is-NKHET.tmp\9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-NKHET.tmp\9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.tmp" /SL5="$701E8,2429047,350720,C:\Users\Admin\AppData\Local\Temp\9847b8fb6f07a309481040d71bf50a2e_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4332,i,15721081447618313297,6839074028983272033,262144 --variations-seed-version --mojo-platform-channel-handle=3128 /prefetch:81⤵PID:656
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728KB
MD504915d39840c9406d1e9347c0eafd7b7
SHA1435056f42e1e18e187d4abbb6d755c1a4f309f6d
SHA256cc26d305824288a1c43c1c35cf8f456c5b19effaa39475f5179d372c4a06eef5
SHA512677476971f40c8f4cc8bd67a9929e21d93802c376ab67670f5a4e9760339796cf872644920d26118631c44857ac254aaf62b0d3fbc7d04ddd30cb04d99f80185
-
Filesize
385KB
MD592c2e247392e0e02261dea67e1bb1a5e
SHA1db72fed8771364bf8039b2bc83ed01dda2908554
SHA25625fdb94e386f8a41f10aba00ed092a91b878339f8e256a7252b11169122b0a68
SHA512e938d2a1870ccb437d818b5301e6ecffaa6efbf4f0122e1a1ae0981057d7d0376039ea927c6fd326456da2d6904803fca26b87245367a4c5de2aebc47bdcd4b5
-
Filesize
995KB
MD54858e3c422bd942631d1b9a911fe4177
SHA18fd3e1773b3a8b0e280fdb1a0cbb5edcc72566af
SHA256016e89879ca116f4cf1c6c1bb3423a3e14b63e79de1d433926693a76ae397898
SHA512683c04faa7e1956d3391d012b28d4ea079c040b4e1a8742ab12d1746695d3d55f2c18257e113706c9aa017d8606d6326a5dc3bfa672238093f6234a2cb5e3160