Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe
-
Size
89KB
-
MD5
c1f69001b97d666c01e4b4ba14cf1aa4
-
SHA1
29e849c36ac63c51a3e5744371e5b11c49aaef5b
-
SHA256
8d8374a15e6bf9e8bd01c0cd381957da7909ed4166806fc01aff28d7fde2ee4f
-
SHA512
62f15276b20ed35102b75c53d2e4a904dda925a358890cb248f27fa60c1b3a4b1af20d864f0acbe2b3e7c01d7e5e2234d43b3a812fad5561e5719f7ae69a5bb9
-
SSDEEP
1536:0E0vedP+zgwAhMn6ib02QZE2dC8WUKmgI9cRiV9KuzFXJNwAXV:h0KPVwxnotdDJoRGjNDl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2160 558340.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 558340.exe 2160 558340.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2160 1908 c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2160 1908 c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2160 1908 c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2160 1908 c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1192 2160 558340.exe 21 PID 2160 wrote to memory of 1192 2160 558340.exe 21 PID 2160 wrote to memory of 1192 2160 558340.exe 21 PID 2160 wrote to memory of 1192 2160 558340.exe 21 PID 2160 wrote to memory of 1192 2160 558340.exe 21 PID 2160 wrote to memory of 1192 2160 558340.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\558340.exeC:\Users\Admin\AppData\Local\Temp\558340.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD57443cb02e4b3e54c2914d3b94d223131
SHA1d3f96eff5523a09becbac4d9e5debf619a28161f
SHA2566ea54fd2ae0807d265058ab2520075813dd13d44c1be6a6259858241dcd76eb7
SHA5120d77bbe581a47e64272300007c80ecd3c762339a3e3405606cedb60418bf0dc7d1ab625f5f2523188de2a9222f35292802abe7d9f76140ee1ba60486e74c6b56