Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:09
Behavioral task
behavioral1
Sample
17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe
-
Size
198KB
-
MD5
17e21e619f841971a6320e7f2ab39054
-
SHA1
83205bfbd53ecb94a683293a6685135ffd1bf652
-
SHA256
987dd3f39e14aa3f6bb5fbdfb4bc5071e03a90059e082ab9c21cb9d11ef21b1b
-
SHA512
70a2311d8bf5fadbee18faeb1d3fe40fcbe77985ad17f58ee57c47675cb46eebe2bfec3b856a257c6b9bc7ddd5269946d3b25d7ecc56fba2906d46f7e14292de
-
SSDEEP
3072:p+YnzQq08AQcJTb8gQ3RTF/gZ9IWhPcqylXouyBRJotNi4VslEjVg4:p+KzQh8WTG3RBxpcJotNiesCjVg
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4060-0-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4060 17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3500 4060 17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe 56 PID 4060 wrote to memory of 3500 4060 17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17e21e619f841971a6320e7f2ab39054_JaffaCakes118.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4060
-