Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
29e179cd4d4d8673bf2f7a05cdd71ba9
-
SHA1
1d013660a4585753ac202aa6b141b0d43e5f565c
-
SHA256
07db934594e8d6009de9e9bcb9cdb25982cb2b7bbfcc874aed705b4d763356b9
-
SHA512
e12cf41525e5ce171dca96640063582c736880c5e24685504548be17a402a3da726ed27b8adbcd9f578135d76faf0ae78987f0621e4c7b20b73596acf76521c8
-
SSDEEP
49152:Qoa1taC070duyiXpuej1jZDV/JeaRh0G3T9:Qoa1taC0dbjtn/JeOb9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 F42E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2936 F42E.tmp -
Loads dropped DLL 1 IoCs
pid Process 2784 29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2936 2784 29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2936 2784 29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2936 2784 29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2936 2784 29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\F42E.tmp"C:\Users\Admin\AppData\Local\Temp\F42E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\29e179cd4d4d8673bf2f7a05cdd71ba9_JaffaCakes118.exe AF7CA5583462807A26005D179AF59AB1802904B8178063CBC74D4C3CC6B9687BBA8A4626560D14B350D57FA3E2CE596645E09B6B1B3818261D14B8AB8063E3FD2⤵
- Deletes itself
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51bce2c945261db10147a184b9a1c0107
SHA1b0ee7694b69276a319d9e630a3758e353e15667e
SHA2562864f9e44ea2e260f781d0886f7350ffdc574b1a291f543386a10a46dd322001
SHA512095c842485da0d61681703929b3274a585413e3f71dae188b9e22a83caca931c9a09a8e00ac89dd59844996656fbdbd040cc94d1b7e6fd456cc62bd2bebc87dd