Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe
-
Size
22KB
-
MD5
2bf4e1940426b155a40f7c7a9de94196
-
SHA1
0f1c4dc84c8afbc557c8fb43f6e304e41c7edb70
-
SHA256
360e5c8184e9a03f413ca39ba1e86f4dc139db27b9c7b2d42eb0764266d8d58e
-
SHA512
f61af64d63c4aa123fc23d35cc24fa295e4fff7cdb3ad0a77f9e06c0db31aa06fce61ab3aa2cef49c6d9e7e1c4ab7ed0e41ce788c336a979d9fdeb9bc1014970
-
SSDEEP
384:ecnE0N9TugdeVfaO+BWVHcufg/1uR07MGLfBGmFRRZYcfH6kLmy:ecnHN9T9eBgWVHcufs8+7zVGa1Y8vLmy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\L = c0999299dad299919981d2d3819ac899909ad299979981d2d3918f91938c96819ac899909ad299939981c6d4c8c3819ad29992979981da98a5a5a3a5a491a18ca1a592978c9396a2a18c98a291958c97a497919193a4a2a48fa193dc819adc5f000000 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2780 1368 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\update.bat2⤵
- Deletes itself
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD5642214b8c2b0409ad09f314bf74e5a83
SHA1c0398ad5ea81b880f7725b4ead9e5a66676bd400
SHA256acbfc4a2b0d528729ca227ed5844947d3d936a961b0d6f5911e14530dbbb984d
SHA512e0d7be7f998bbb626993efd4b9ef1dd4afbad1ec4ba0a82d49ac1ab3ce7ef76c42d23c379e0d61afa004a1d49811c4c5f707bdbc318637376b64a19eae298461