Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
422b269df7789ef6a00b393bc376722f
-
SHA1
71b730711bf22e81eafd27309304dde1296561f5
-
SHA256
e66093cbd415872be495b4c5885c40390783007bfcb50423bdb51c51623382b0
-
SHA512
2d93b1a795778dbca8bd989e0dad06907f17259f2718ae8bf5b82382fb3ebf17db4b30be2db5408e8100e6ee1255c7fbb863b5e6e377cf0155c745834fae0767
-
SSDEEP
98304:ODnoy0lyag6B8If0FZowSlPThFb0vt02ReGho5vBOVNvx:DHNFYvt0wkZkNZ
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3292 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 3292 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 4212 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 4212 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 2132 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 2132 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4212 3292 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 84 PID 3292 wrote to memory of 4212 3292 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 84 PID 3292 wrote to memory of 2132 3292 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 85 PID 3292 wrote to memory of 2132 3292 422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe" /restart2⤵
- Suspicious use of SetWindowsHookEx
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\422b269df7789ef6a00b393bc376722f_JaffaCakes118.exe" /restart2⤵
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320B
MD5200be48b3d46b71cc5557e9fa0f8e820
SHA1b4287c7051550857fc6a2c9afbc46d7c985945bc
SHA25602759560f08904a693ce8b664c24d7de95ebe24a5192eb36bdc8d8eed12a7011
SHA51285515b872dffe24d7b420ca83320b60c2a774b8ff2dabce6b20298806fb6975a571de16e6ff6922cdbba0f436c3ae4ecedf66248f06d692f5d80e3e3e64b6068
-
Filesize
122B
MD563f7ba25f5d91cd9c064e43803e3fed1
SHA1e9a837cd8152cb50400482bb6bd91c7887dc3654
SHA256f78c8aec2fe211384341c6db7e278cac21ae746715eb3b7ac6d07a044653ae04
SHA51278950f8d7cb04376e848760fa7285dd71c9951a609ae422bfe7bb5c419b0b2a26070b5325ab843535970850d83b24dbb30eb6ecf570b9a700bfddd93ec68b3a1