Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe
-
Size
449KB
-
MD5
4770c42355f88d7b260d8963c4157104
-
SHA1
fb1bed1683a63ff2d30cd0faba73966c134931d3
-
SHA256
508d4e70ea48476ef268ce20686ea96b1cc9aef429811ba13f603c07edf38047
-
SHA512
f59ea5ac2336c4a4a3f010189dd3b6cabc9b8425ed01be44a532b748033cb7872bc05706a4bde1ffcffd5f3719459c641e7cfaaf142743c9c574987d01078227
-
SSDEEP
12288:UaS006EYS/m/KQUWrAuqIfTwwEYOW22oPDig1NsX6:BEY0my9YAHOw1YzMDRa6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 Explore.exe -
Loads dropped DLL 2 IoCs
pid Process 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Explore.exe 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Explore.exe 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Explore.exe Explore.exe File created C:\Windows\SysWOW64\Deleteme.bat 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1656 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 31 PID 1744 wrote to memory of 1656 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 31 PID 1744 wrote to memory of 1656 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 31 PID 1744 wrote to memory of 1656 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 31 PID 1744 wrote to memory of 2248 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 32 PID 1744 wrote to memory of 2248 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 32 PID 1744 wrote to memory of 2248 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 32 PID 1744 wrote to memory of 2248 1744 4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4770c42355f88d7b260d8963c4157104_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Explore.exeC:\Windows\system32\Explore.exe -Service2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
PID:2248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5519ecb6f76238d711ebc96487e3b55e9
SHA1949584d9b7c7dbb801977771a6043c5e4dfa1e33
SHA25689942f8eff18867a78aaa106c9a4a62fecee6765ff45cfe26244f7e47df51ce0
SHA512e8e910b8acdc75c51b2b12b0f0c59441cd05b341655e7b81a9cdddc37f42dc4329d8c402d6618685e5f0051005eff04e117febd51f8e9309ad1930a95af02f6b
-
Filesize
449KB
MD54770c42355f88d7b260d8963c4157104
SHA1fb1bed1683a63ff2d30cd0faba73966c134931d3
SHA256508d4e70ea48476ef268ce20686ea96b1cc9aef429811ba13f603c07edf38047
SHA512f59ea5ac2336c4a4a3f010189dd3b6cabc9b8425ed01be44a532b748033cb7872bc05706a4bde1ffcffd5f3719459c641e7cfaaf142743c9c574987d01078227