Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe
-
Size
705KB
-
MD5
23461048023ee07e2b6fea660d4017bd
-
SHA1
a91fcd87c694c4920c3a21d8875da32420bca480
-
SHA256
43d4979c1044b15859b2f9a42d7807717ae2c1a26525cb81b4f2e67f1f960440
-
SHA512
c071e46b1bd3e431bf9cd1922766cf9c241921e18c77e8ac99e8ba4cc0deb5d9eccf1454f1d1176c92ca0c4c465e5abc5be5835e70b4f0a95398e9ef2c9fe7e6
-
SSDEEP
12288:s1bhnnx10Pvtx2sbMOeEIJIjzS7FdLLcHHm5ylGuwIUbxQTHNy5tAlcfl8ak1P3:s1bhnnx10PFx2nfEEVL0OylGuwHWrQ6n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2144 install.exe -
Loads dropped DLL 4 IoCs
pid Process 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 2144 install.exe 2144 install.exe 2144 install.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2144 2140 23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\install.exeC:\Users\Admin\AppData\Local\Temp\install.exe "C:\Users\Admin\AppData\Local\Temp\23461048023ee07e2b6fea660d4017bd_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD54de076d4f65e5203bf46319d255a00fa
SHA1454e83969963a821cf6d89d9d8bf10a8ab4c5eff
SHA256cd3da97f440966dc0ad0efa3aed9cc3c1b733fb6ea7b11df0b033cc4e47e9ea2
SHA512a710c107c4dd7b75dfe3860fed8985f0e485be356330791403779eba93940555b04be62fe9ef213b03ab5bddd8457869c1b130b3a0a51cd5cd26b6ec725dc7e7