Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe
-
Size
9.0MB
-
MD5
46c2a8e01bae82c90b64e3fd39ef847b
-
SHA1
989f6d8694b82c2eccc3a4fc191fbcabf9897534
-
SHA256
79f3abde37cb28349d86bb33a4987d223c5258074037d6841abd16316c73d052
-
SHA512
ffcec59af754c7cd03eb190330104b01190a5247aa0bc8a16352a24b572e35a20f245c50687f32f02418c17acb936d2a8f140107829c2727a9aac5b379afdafa
-
SSDEEP
98304:PGHjLN2jLN3sjLu6LN3szLNY6LNdLN3s36LNdLR6LNLLN3s36LNT:oL0LqLbLILfLDLlLDLkL1LlLR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 rzfkdhh.exe -
Loads dropped DLL 2 IoCs
pid Process 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\rzfkdhh.exeC:\Users\Admin\AppData\Local\Temp\rzfkdhh.exe2⤵
- Executes dropped EXE
PID:2876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.2MB
MD58f7a824e0b8c7d76daaa0c8d379895c3
SHA1afc395a7ccd32466ee64658c817ef169a27f13a5
SHA2565717434f6574d00f16fe00b66f75deff85a39cdda0578efdab92f1341e28eb3e
SHA512b1cbf531ff4ce2d312b56f0847e7a8228305d35a2afaefc85cb73c39fdad43213cc26d5a5bd70062769f74f4d604a3f96def3a6a762c03affbe6af1d3473706c