Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 16:42

General

  • Target

    0ac653755d1db8f088ac3f3aac63211e_JaffaCakes118.exe

  • Size

    82KB

  • MD5

    0ac653755d1db8f088ac3f3aac63211e

  • SHA1

    a6a4bcbb9a1b449676f2fb9f27faf544b59c8f7d

  • SHA256

    493fcbc3c85ac57f73e8b96c3b4fc8ffb12d9d71d43c780e39df6207d437d1b4

  • SHA512

    96d64aa009721003e92a1b2dc48151aa5b103117bf847430fd8d2025e06d1eeb63158a62f23ea39ddccf4c364c1b9c288003005a4dfe2b54f82a178350d98a67

  • SSDEEP

    1536:ywTHeCP7l7cICyLFNr6rO7LAodrnmIwX+1/bdJs+nD8dwWChOrbK:ywawl7cIf3urtermIwXSACgdCK+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ac653755d1db8f088ac3f3aac63211e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ac653755d1db8f088ac3f3aac63211e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\0ac653755d1db8f088ac3f3aac63211e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\0ac653755d1db8f088ac3f3aac63211e_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2920

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\0ac653755d1db8f088ac3f3aac63211e_JaffaCakes118.exe

          Filesize

          82KB

          MD5

          0670083a76791eabf14f6b34d2f96906

          SHA1

          2927183e243f3ff4e633fc921b791b4d61d5e1b1

          SHA256

          f760ed4f265335fa7c223590d9da4329d08a6ed17ccf921c44ae46a20198ad7c

          SHA512

          b9e84012542a47a0ee45c8cbfac0a08953385a5af028727199ccc5025b4c6bcadd387859c12e059493c422041298c2814362641403969affd2c8ecd61aa07516

        • memory/1972-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1972-2-0x0000000000140000-0x000000000016F000-memory.dmp

          Filesize

          188KB

        • memory/1972-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1972-12-0x00000000003D0000-0x00000000003FF000-memory.dmp

          Filesize

          188KB

        • memory/1972-15-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2920-22-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2920-27-0x0000000000140000-0x000000000016F000-memory.dmp

          Filesize

          188KB

        • memory/2920-28-0x00000000003B0000-0x00000000003CB000-memory.dmp

          Filesize

          108KB