Analysis
-
max time kernel
96s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe
-
Size
506KB
-
MD5
e2b1e8afbacff1108a6fac8d02daa8ed
-
SHA1
db6155392ea8c9ed03107e605664986ace78fde0
-
SHA256
e5da3a29bcbed4e83c21a3675190c63204f20b490cc58132613ef71b12e51a84
-
SHA512
e565eb6a43a2c759493fe2afee136ec62c7d93ba1b1bb4ab2ef61b9327ce8bb894d76150fcb801f5bd2cbf7ad384b41dbd76ff76bde26a54ca9bfa5ff88d1972
-
SSDEEP
12288:Qkfwvk/1lYFpnZkM34u6xLm33EkIL6GpDWcgLjeaJs8c:QkJ1lKnZ5J6BmkDkOayv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 64 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 64 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 64 wrote to memory of 2384 64 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 85 PID 64 wrote to memory of 2384 64 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 85 PID 64 wrote to memory of 2384 64 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 85 PID 2384 wrote to memory of 4412 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 89 PID 2384 wrote to memory of 4412 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 89 PID 2384 wrote to memory of 4412 2384 e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e2b1e8afbacff1108a6fac8d02daa8ed_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5669fd7530e14c784e986cdc2bb22e75a
SHA12ce41e2e87d849a3407c54d7054937c16c2bca64
SHA256b425f0f8460d6072e0318893a7c0eb14e22fbc55e7153e93c2d200564f9f101c
SHA512c0203751ab9dbee2de57937e87c495f5f9e4bb53704bc60fa4759aa4af3a9007100c2dbaa02b753d91dd7a98b2dce0f67e453d622482940d11a5fb15112f6815