Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 09:36
Behavioral task
behavioral1
Sample
342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe
-
Size
56KB
-
MD5
342d47ba4069cffd8e790518bb4cf724
-
SHA1
5e0f4921fd3557bd2e37e2e77beaf77c813aaaad
-
SHA256
821ed9cc66075dc4eef18042c533cef623ae3899129660457e5b11de31679827
-
SHA512
58a03b97b0e68f448129e0ec6334cc4617230248e86eeeccbb9ce95539547e5f588a21ac767ef6307ba77586927b6f43a3a1295d150d098fb1cf73e842c5b552
-
SSDEEP
768:L4QhOF2PBEPRTIelvWYqAartcIgPkhFd5AUGkoxCVgH4kMc4hZK5iCLMvNxvimtY:kcclkruIlF/GkC/zM3c5ZLMX1SKNyx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2912-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x00090000000120f1-10.dat upx behavioral1/memory/2912-12-0x0000000000170000-0x00000000001AA000-memory.dmp upx behavioral1/memory/2832-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe 2832 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2832 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2832 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2832 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2832 2912 342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\342d47ba4069cffd8e790518bb4cf724_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5c81ab80a564a18b744ae0ce1a293bb3f
SHA172c157f62b155b2c637b1d80ae1d75ebf5314571
SHA256436d0d2a8d498b9c40c274ed75ab05442d2adb4d8bd5c976a542fef1e2561ab0
SHA5124d59d8e909f40b80430d16ee48d4fad17e1a693e7a8efbaf6aa9fed0b1412a839006a860101be32632ac785975110d0427d9c7aa31da15dc574a212c30676efd