Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe
-
Size
391KB
-
MD5
161a9751f1b788acd1e03aa79e1e52ea
-
SHA1
b9067b4e7430653034a4917e0cca275f30cc8dec
-
SHA256
c7e6473c287666b1adb48b0a8b8fc47e073e59d023ee79e287463c1148ecf07f
-
SHA512
017df4873f7b478ba5189685e42f73419b83b21b167b4db8f5cc6413d735988ca9d7bc021fafad4880a9dea15d80eae5b9393a03fd00bdc75adc093db0b67ef2
-
SSDEEP
6144:G3DM5k0X1/P5GwK0ofG64WLdsAhrOD9S088A42G98gWNlPTGQQm6agrd+h:G3DwPJK0WGWSwCw8A4SNtTirdW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4748 Windows111.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Delete.bat 161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4748 Windows111.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 1548 116 161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe 87 PID 116 wrote to memory of 1548 116 161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe 87 PID 116 wrote to memory of 1548 116 161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\161a9751f1b788acd1e03aa79e1e52ea_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:1548
-
-
C:\Windows111.exeC:\Windows111.exe1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5161a9751f1b788acd1e03aa79e1e52ea
SHA1b9067b4e7430653034a4917e0cca275f30cc8dec
SHA256c7e6473c287666b1adb48b0a8b8fc47e073e59d023ee79e287463c1148ecf07f
SHA512017df4873f7b478ba5189685e42f73419b83b21b167b4db8f5cc6413d735988ca9d7bc021fafad4880a9dea15d80eae5b9393a03fd00bdc75adc093db0b67ef2
-
Filesize
214B
MD5d6b64436794a8ac893b934bbf647bc5b
SHA109dfe9072407a64943ccacf3a0da8ea0755ab0fa
SHA256d62908af71367a55a2927da7da5754abc8c05d654b5462fb6642ce90c08bea77
SHA512c01fe69590af9434a31cb673833419187c1ee414ced09c8fefe3c03242fce4001901e0d4a54efc47835d77bef4b05dd81a7b231e847dd7650e1b41c2f45c9dbc