Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe
-
Size
544KB
-
MD5
2848332ec369b5ce8ac950be55f8ee9f
-
SHA1
4dfb60fc07fe2fafdcbb9e2262cf358841b69de0
-
SHA256
fc4bba00d33f66ccb7a5205b33a2bd645647370887eb3dd82e5ae16a7d8853bb
-
SHA512
42258fb80646253351509f501b50f2d3a3ad0903933bed0b37d4e0517ab8691195da9d8361c59de1e3d58204b0f3f5b232c13a591467d644ab58b33ec3117c97
-
SSDEEP
6144:lV+zsJtu+zsJtv+zsJt0h+zsJtu+zsJtv+zsJt03:j6otu6otv6ot0h6otu6otv6ot03
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1284 54274274586.exe 2304 54274274587.exe -
Loads dropped DLL 4 IoCs
pid Process 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 1284 54274274586.exe 2304 54274274587.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1284 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1284 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1284 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1284 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2304 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2304 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2304 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2304 2120 2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2848332ec369b5ce8ac950be55f8ee9f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Temp\54274274586.exeC:\Windows\Temp\54274274586.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
C:\Windows\Temp\54274274587.exeC:\Windows\Temp\54274274587.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD585be2d615925b92ed3db90652eaf8b46
SHA17c3b2d221403388c5d3b20700180c8fb3c6f8668
SHA256b42faafec39c7e04fbc46c2bd6e57a494de51524f1d8d5713572d4eb474ad4d3
SHA512d2dbca2eaf8c2392b152b0185613195c5660eb32feb68e2095524db85bb5b206141085c453049a072d70fd0289fc30469cdf6a5f70483703a396396560b05eaf