Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 07:58
Behavioral task
behavioral1
Sample
27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
27d0dd27c89a60316e432f3011cf9df9
-
SHA1
bb87ce3eb550842491e0e8bbdc372e3099ff59e8
-
SHA256
66dd55474c6cfd1daeaa22269a5675925532245e388ac3f781c54d2f79be8bb0
-
SHA512
9332a5e8131b4acfe63bfd863df82b16385dc79b3858aa394b6cf8e7f33b7b8708dadd9fcadb39b13fe3a8db31fb3d2c9e3b1b37edddc62e624b83bde741a15a
-
SSDEEP
24576:6zCqx5Pf8ADUuxo6JzIWvU3TFoGohUaHBTUuxo64:qhphUuG6Jz5vU32uaHBTUuG64
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1272 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/616-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/files/0x000b000000012286-11.dat upx behavioral1/memory/1272-18-0x0000000000400000-0x00000000004E0000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe 1272 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 616 wrote to memory of 1272 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe 29 PID 616 wrote to memory of 1272 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe 29 PID 616 wrote to memory of 1272 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe 29 PID 616 wrote to memory of 1272 616 27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\27d0dd27c89a60316e432f3011cf9df9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5cea6487d45e929c6683e26dbb65e03fe
SHA1ae97a7a879a8fc6de72eb239774e9145c677c602
SHA2565703740f2f03585fee884a60eff7540b340c2328b3f55ba608afd0d021f0a595
SHA5126ecacbcceb2b2c4aa14617ac338606888ad2ab42b190687321a281bdb1c99d0a0bcc183729338fc7d4cc25ea6b29a3f24c615a8df9e877a1ebc0d675b9905fdd