Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 16:34
Behavioral task
behavioral1
Sample
230f04b236240690627c20a998600563_JaffaCakes118.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
230f04b236240690627c20a998600563_JaffaCakes118.exe
Resource
win10v2004-20240611-en
3 signatures
150 seconds
General
-
Target
230f04b236240690627c20a998600563_JaffaCakes118.exe
-
Size
75KB
-
MD5
230f04b236240690627c20a998600563
-
SHA1
347f5b1dc6485abdc2bd6ef954cfaf52fea7f673
-
SHA256
d365d67ece0c99d536cec8dd5cb8d8509cff399f7e27c6553eec218f1ae7a719
-
SHA512
862d581cc0217fd5256a4f3812817647e35ceb9e5232ef3ad4a82f2bd4be07b71d45dc008481554e95db001320f043f8d73f5bca8ceafe90b1d59441318fa375
-
SSDEEP
1536:sN0OXUbUmQeiVbISGXEapWCHeyMTC2vo4DR3+sqScGSTh:uVg6tGXrwLbOx4DR3+tScj9
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2400 2148 230f04b236240690627c20a998600563_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\230f04b236240690627c20a998600563_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\230f04b236240690627c20a998600563_JaffaCakes118.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2400
-