Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:02
Behavioral task
behavioral1
Sample
3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe
-
Size
17KB
-
MD5
3e54f3ce3682022abff346f2d6ad1f95
-
SHA1
399ac6ba82bd85745a9c7b27aad2b6683527019c
-
SHA256
17606a4300eb7ba35eb309c9130056b88148f9694349e9ea9826a73c192d3eac
-
SHA512
25d8b9928b13e820eed3cba425159f8488124657fe94ea722f4c7add19e39654e897563e8dd224348abf2f505aed6bda73cdc9314704c452944e4ec6a4a3dc8e
-
SSDEEP
384:6kA30Yany/6Ext5TtQ4u/wt7aaIhmXja4eAiMaNJawcudoD7UB7:6730GtQ41a3vFnbcuyD7U
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4132 3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4132-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4132-15-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3496 4132 3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe 84 PID 4132 wrote to memory of 3496 4132 3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe 84 PID 4132 wrote to memory of 3496 4132 3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe 84 PID 3496 wrote to memory of 2920 3496 cmd.exe 86 PID 3496 wrote to memory of 2920 3496 cmd.exe 86 PID 3496 wrote to memory of 2920 3496 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e54f3ce3682022abff346f2d6ad1f95_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AE51.tmp\Trojan.DOS.FormatC.g.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\choice.exechoice /c 123 /m "Selezionare una risposta..."3⤵PID:2920
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570B
MD59b7c2f555b68452f26129263a2f7d2b5
SHA133d3c3a98cbd25f6afd802f6185bebc42602a37b
SHA256d87fde1c4c9ab1f713b847c1a5f644b210d1b0febadebded9988ad6b57fc5dd1
SHA5125911cf888c0321ab1bcdb951c59af0d6eb7fab334884a6b6e9b8e9fef2f9139b0fbe3c3938d1d418e573e022e8cba41c24d6398512921005cb6ec0fdbbcff104
-
Filesize
31KB
MD57b860f28be19d4aef761fb991134a556
SHA10658a7456d0234dcca598b6ee599fe134d0ecd61
SHA25657a2586d73188a694944c7da60c78380f82fac46452ed1a31c818ceb93e660bc
SHA512a0685a25cbc3fff74aa4ad538ade5282242980f07fe1171e01644e0fa98e1ec6adc87b943290983f6fb5070d26fc15d697ae31a1f570e83e504ae1e4508aefa5