Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe
-
Size
380KB
-
MD5
0849994b83eb44b41f4b1331a2783baf
-
SHA1
623d0daf84640300dbaa7417fff44433948e0677
-
SHA256
d5a53ee176f5f5e0e7c4514881dc37f4c319d95587a85bb1cc602db8dc7bbbc6
-
SHA512
ecd4b8c1c0c14e26e18bf7df75e54fb8c51cf2b2d9a3b972cdf92f0c3a131768fbd326d40dcaa8484ba63e6fc0f7815945ff4ba96968b8bb392e81f07295de3d
-
SSDEEP
6144:vuZBS2uyqr1wyWLDtc986QMAXuXlncZ4oITX+6f2nnxv5XOgpbAAdNOZ+:xt1WLDsDpdBQeqnHOnYO
Malware Config
Signatures
-
Loads dropped DLL 64 IoCs
pid Process 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3408 set thread context of 9320 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 80 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3408 wrote to memory of 9320 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 80 PID 3408 wrote to memory of 9320 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 80 PID 3408 wrote to memory of 9320 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 80 PID 3408 wrote to memory of 9320 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 80 PID 3408 wrote to memory of 9320 3408 0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0849994b83eb44b41f4b1331a2783baf_JaffaCakes118.exe2⤵PID:9320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD511604a1af886bd4cf428b98d86e2f8e1
SHA193aa72a76687b1ea8d0caa2b7f1ae219a6f1f1a5
SHA256104ab0e5a4a923dba8baaac76cb8e063508ddb7e758d36875e676a483dce4435
SHA5128e0406620f899458061a1fa3af36d3c82393587bb5eedfd619e71cf2e6563966689d20461e412f813a4dfe9d7429982e7e3c50e426608e5b55e4737fac27bf76
-
Filesize
84KB
MD5c97142d412ed7824db552f43e5fc3446
SHA19f0b55e0aeb9e1a6704f39d483ec793ebd532360
SHA256bff36dfa67d3f94b15d668ac8aa98ccfd754c51954717b7a6a1cd98090c69d28
SHA512f36d7bee8660ff828648f28f02205c121e460cbf894132f55d3269c0de11864b67d6796aa4c44aefb0cc2ed1f5b955d7e41a7a51c8e93e33f7782523713e29d7
-
Filesize
80KB
MD5645ca36178b2796083e0935b004abe7a
SHA184678b186116ec1601beaa5031b711a50909cfaa
SHA256c04d4ed9c71a63af0ba505a5092a0c518d1b41de781febd13c19d214428cd0a7
SHA5127a7284e20b78e682f9c1fe0400575eddf69847809d3e6171e2974cd51ccc06a0a84f5b0116fa809b556b10610ecff91b1b1759b1684b9e702b52cbbc2c60f013
-
Filesize
32KB
MD5bdf4f5e4505e88e30aaf7eb1290ab4ca
SHA1cd9bba6bbe76542fea9a9106fdcefc6ed980a892
SHA256c4b24591744d3924d9d80fe5ef60a4ccf2c9ea63a89f8cf68732e27e03ee6225
SHA512ae4cbae323feda3fe34775e32ed5aeebcd30169a7813e9d33accd2e77f1a9f11c22386a1dc210c132cc5415b346dbbfb5470a6f55c4c07ad087a1a1dafa3c922