Analysis
-
max time kernel
140s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe
-
Size
230KB
-
MD5
42353f22cb7fb0979cc84489a7564780
-
SHA1
99969952dc9ed7d7ed8273b1bc8583aac11d2158
-
SHA256
75c2c3bf5df27a939a8cb75dfb40167ffb188f30b1cc1bcbbdcba058fefdd459
-
SHA512
02c3332457449b768fec12f48c66b8b3ecdd1b0f2636247186c8b4c7d3d6a5b5efb9260d5fd9a51e86c6156b4c1657dc7a6303297c768c67978d6536dd2a2c4f
-
SSDEEP
6144:IDm+YZTaUXoOxKg9ZEodlxrRZWiziSbTsgPz6:Iq9U9OxKghRZxzPkJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 sxeF00.tmp -
Loads dropped DLL 3 IoCs
pid Process 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 sxeF00.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2084 2468 42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42353f22cb7fb0979cc84489a7564780_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\sxeF00.tmp"C:\Users\Admin\AppData\Local\Temp\sxeF00.tmp"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
432KB
MD56d4dfc8a7047cf67c894878a1d6370f8
SHA1ceb671524564b9e76d74cd96454c86df4924d0ce
SHA25626602b99ce4c6ff6b2dcf5b6beaf6b97f98ef9004b665848c658e82ae4024b6c
SHA512f4134573d7c5fb8632e5b9342857cb8e0083b806317c80ba5e941e58de727693d041acb8dee203bb210008fc21879bfc07623418177da43d97c6373f5ccc0c8e