Analysis
-
max time kernel
142s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe
-
Size
185KB
-
MD5
3a56cc58e009d3e94094ede97b7a76b6
-
SHA1
38f1c63b3f4d2728d8dd3e5edba29a69a65e7e21
-
SHA256
108116ebe972df28427cd9b35ae2e797a07a236f3044ffc14906d784f1c3e853
-
SHA512
8d1b1454c860e4dd737e8fac05faee9d86f022f7e45f588a370bc9da5925a994694b18e5947dd0e04af0cb59f383f2620f9948ac5794673e0efe6e7cb86ceabd
-
SSDEEP
3072:fq8T/rfl5rhrnhjMcmxW0DuWyAm0irgWT4yt1yG+VCrAcKwwNntXAd/glLtvdET1:C87rl5rhrnOvhy3Tx1yDCrawyntXAZgI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/988-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/988-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4928-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/988-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4072-70-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4072-71-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/988-140-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/988-177-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 988 wrote to memory of 4928 988 3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe 86 PID 988 wrote to memory of 4928 988 3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe 86 PID 988 wrote to memory of 4928 988 3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe 86 PID 988 wrote to memory of 4072 988 3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe 87 PID 988 wrote to memory of 4072 988 3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe 87 PID 988 wrote to memory of 4072 988 3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe startC:\Program Files (x86)\LP\F027\4FE.exe%C:\Program Files (x86)\LP\F0272⤵PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3a56cc58e009d3e94094ede97b7a76b6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\7FFAB\4E3F0.exe%C:\Users\Admin\AppData\Roaming\7FFAB2⤵PID:4072
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54b4508afb8ac108b7990f05b51aaa4cd
SHA17666aa912181e19e8a3308fbc95dcc6db4773ed3
SHA2560fe347a9b67bbb97fce25d879a1cc2c1c26d364876af46396e093d9c30a4c2ae
SHA512bd935152c6ed94448d9ef4d74bd78200d167cdbe0256614af435ed5c1115d3a0e53206e2df8940c1506ba6693b6e0410b700a5cc7e958c0f8c0ca69940263c80
-
Filesize
600B
MD5ed517b076f6377a925dcf8cbd1191d28
SHA1f6dddcf4a1e0b7edfab21d5b385fd10a0dc20edb
SHA256c5110c0a123d24e4140b23286af53d03e5188c9b25d0c4ecf44a692b00abece3
SHA51209f94a943fe605afe6ae48ff3248a13862c2a010b2dcd2b234f9a02a088624a20e40a76a0ffc61750a2289d469d052937fd7b49ccc8afa6daf77f17a6cc88086
-
Filesize
996B
MD53f31f52316725fc15a61983fae6efb0c
SHA15b2dfebf55a5fd87bdf6d2baa7bdeab5efd42435
SHA2567000289051fe48346881a8b0dea3c2be638208b1d1587ed3a5e2f73af52c6706
SHA51266e2289dc46bd5d0eef641b318caa022b6b15324604f0e9e3bea219a4815e2ea2ec72b4628a621888e3213c4ead477c06b260c4ea9d8447af289472e99085e38