Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe
-
Size
33KB
-
MD5
5e0972a764c36ae09e471818ee48d6d0
-
SHA1
2b566afa4fa3c4408a2def698240d5daf904dac7
-
SHA256
45adf34a96292bc9183f95219094487a5c105d44e0ae9d187199a9cb9a6f2616
-
SHA512
64475556abc4889892bf11836b27c3ad318e42ef8295168983835d279ad11466ae63559128442c05371c715c00dd03a07ba1d4e6df3f037c5e69ccab4e2b15aa
-
SSDEEP
768:6oTBwOjwtUa1/JoV4WGdpwlqou60DUOPYT:6mYUa0V4WGQlu5UOq
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2316 RUNDLL32.EXE 2316 RUNDLL32.EXE 2316 RUNDLL32.EXE 2316 RUNDLL32.EXE 2316 RUNDLL32.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bpelrmabyk.dll 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2316 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2316 976 5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e0972a764c36ae09e471818ee48d6d0_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE bpelrmabyk.dll,ThreadFalse2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53db81a3896d6f099391e1e0c355fc08b
SHA16baeccff14904b900b0d00532b116d13f7072b39
SHA256af4dd898a29c947771621752e91f106353a2244f619406dcb5b1cb8a8242ee1e
SHA5126f132f3d56f06a207b0e2e1257d68e7af6995656528a76d003d724ef5a29e471fb49117b330387d973a1fb4da458e0b56b453bda5df8d00903e3e9c31dbf93e0