Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe
-
Size
180KB
-
MD5
62aa7d0274f6f46846c0bb90f2965607
-
SHA1
926c94579253a9c27ceff76d48d42b2f0d270bcd
-
SHA256
178b418bd55b9d1213fc908edf648d0edbf56ca55d7679e987d1cf58c278fa1a
-
SHA512
d6673820b99ee84652f00eeb996819d75c28c5200e7d7d383f4e83ffc1ef6f46faed567301dd04319888fa58f666dc6406c627ea1be0fd84e1be50948028af1f
-
SSDEEP
3072:og+jB7ZPcVemuaW1BOR5OE1EM2jASY1atZgn37zpnop2WtXvs3R/:orjBlP0emBGy92NgvpnoJtEh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1028 haZl0oh.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1028 haZl0oh.exe 1028 haZl0oh.exe 1028 haZl0oh.exe 1028 haZl0oh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4256 wrote to memory of 1028 4256 62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe 84 PID 4256 wrote to memory of 1028 4256 62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe 84 PID 4256 wrote to memory of 1028 4256 62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe 84 PID 1028 wrote to memory of 3572 1028 haZl0oh.exe 56 PID 1028 wrote to memory of 3572 1028 haZl0oh.exe 56 PID 1028 wrote to memory of 3572 1028 haZl0oh.exe 56 PID 1028 wrote to memory of 3572 1028 haZl0oh.exe 56 PID 1028 wrote to memory of 3572 1028 haZl0oh.exe 56 PID 1028 wrote to memory of 3572 1028 haZl0oh.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62aa7d0274f6f46846c0bb90f2965607_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\haZl0oh.exehaZl0oh.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5fcf78ff7b7caecd845092048e76e38ec
SHA1579103c941851ace07a725c51bc0ec500cb44fed
SHA2563aaf03824ce7307c34dc7c8f34324055564e55841be92a5fc5581b64d04e7cb1
SHA512a7edf6d5c552681031b88bf7d53e59f0a7baee55e0bbd8be6fe02ba9be1e781461489821f8edee9de9b83ceaaede60169d15f2511e33be8a1e8eb16aa93c558f