Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 03:47

General

  • Target

    2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe

  • Size

    277KB

  • MD5

    2ee4a8b76f3f0bbbd1c96a6137bf1389

  • SHA1

    4f5ae9261f2367f6c4d9d33e130fdfc3c4037480

  • SHA256

    35fc81fc8a8bce9877d13c71ee495f3d55bf2ec3ed9db53cf0e6026d27a92f93

  • SHA512

    d4fa12ab46fce9a5a3d41c46a4f498e009fd177b6e60f2100207f4f8f0d9d33a698e74e67f21e07b98d23167af4564812f9ffe975d790dcda4a88c0498ce728f

  • SSDEEP

    6144:iFp+YQggheXTcqxv476l91LHyAO6jtk+9nbMjzWleHjxPGBf:iFpHQg4eXT3676lvLHzO6jtk2nbMuleD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\.bat
      2⤵
      • Deletes itself
      PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\.bat

    Filesize

    356B

    MD5

    c51dfabf25bb481abb4128a6412dfdbd

    SHA1

    d2dc404aee692111468efeb976520303bb87a224

    SHA256

    9d987f72105109b875c6b01268b932de28e9b7ae1a0657d4fb9ce2dc698bc6bc

    SHA512

    46b0a9d3ab51f5d0843a9920f2bd70b984bf48bbd1d8a8d1013a446cd9464595ead6682aebbbebbb1d5d1bac36323016cf3ada6828e60ce4c9ed58b1246570b0

  • memory/468-0-0x0000000000020000-0x0000000000029000-memory.dmp

    Filesize

    36KB

  • memory/468-1-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/468-2-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/468-4-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/468-7-0x0000000000020000-0x0000000000029000-memory.dmp

    Filesize

    36KB

  • memory/468-8-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB