Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
3e7cfb168cef65a018133960b836a45a
-
SHA1
cd810652818ff8065f26495fd9cb19f8d78d0de2
-
SHA256
6bf0d7d379114b634766666c9be5f6ae874c82bea5ccfaf3fed5d6d07567f11b
-
SHA512
ac366335f6ec432a53a4895990d9543dc81d45f323966e79eb4bbb85519fd62884a1df9fc74966ca0a9037c312efd2a5a633cb6c88823d400cc84d6d498c2e7c
-
SSDEEP
24576:8naNm1/fqXfnug9LzaopbMIh5jOln8K/3CrcoFfvxjtN/5ci2W1G:8aAJfqP99LrFUqWyrD5ZNX2WG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp -
Loads dropped DLL 3 IoCs
pid Process 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 2304 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp 2304 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2304 2400 3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\is-P0C7Q.tmp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-P0C7Q.tmp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp" /SL5="$400F4,867093,166400,C:\Users\Admin\AppData\Local\Temp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
797KB
MD57e00d5a59d18abb094979857a4495518
SHA1f7cdccd9a03a260c7d0b724df5fee2ee1dcb22d6
SHA256eef170da7985900955d7fe4229c136045fc4bfc7a350a033d484b0cc4c82cb08
SHA5125697e7b6a30df3f74c7d469fac0d02717cbc9511a0681cc9d65032a50124ca572584f80ab9b39fca7a74ce76a0e01cbb63bdd1f66d39be3f48beb2b362120492
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3