Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe
-
Size
412KB
-
MD5
5d46fd81b1a10df803c90657ff559a85
-
SHA1
bce9acf7fa4c0ec002a5e65c0faf9ccaf3253ccd
-
SHA256
5b6071e6ef76a90ea0926e8fca14b36a110c9b6a1cf8c6b19d074ce01f47fe28
-
SHA512
b2b5a361d72dea77f8a77d8adfa4f959d8c0597c9cd50d0557b26121efc1fbd8075549af3ea644df0b6b8bcaa226d1bf320ea5d11f462f8c9e60d80301a96753
-
SSDEEP
6144:gSx15x6uh/YSqD3LzGONaB3WLsW3NVhxMEmW5WvRUN2/k+4jML+GbSzIV15:/nh/YTzfGONWQb3ZxMEZ5Wv2ek+4M7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 callback.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\ReAlplay\structures\callback.exe 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 2276 callback.exe 2276 callback.exe 2276 callback.exe 2276 callback.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2276 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 30 PID 1924 wrote to memory of 2276 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 30 PID 1924 wrote to memory of 2276 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 30 PID 1924 wrote to memory of 2276 1924 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\program files\ReAlplay\structures\callback.exe"c:\program files\ReAlplay\structures\callback.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5dac3289cd048c84d72db13d9918a5078
SHA1e714b99f3473b68ad751e15e61baae9450e254e6
SHA256e7dc5a0ad33df9082c670edc9477298e58df3c1379332a54cc1c83bcc7520ccd
SHA5121e443ecf3b5206bf43eb008165c88ddc11572e1a3bffc6a2ec24f3cc847d275cf5ccf7127522d63e8dd986c43d62a5aeb243a944225fb913d6b2ddbf8612be78