Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe
-
Size
907KB
-
MD5
e78730d6016835d4303e1d187bed9501
-
SHA1
a3c7bb17cf4bdae87013363dfc1aef405d67ab0e
-
SHA256
02cc514ca6b10e2ac87a6926d0f962d0156e89a2b6ae21e2c177c9e09e8bd689
-
SHA512
8b91f811f6909f0dcd03b8211d25f558d32d6157e7c6ab053d1aa6f36e98ec956911bcb729a8cdde665034c5ae72870b914d01c5307f10765f9adbe373d16409
-
SSDEEP
24576:6JOaH1AIxWGFXSZ+mnSFYg1Z6RVha/ZS1:YH1AIAG4TaZ6RVhgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4360 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4360 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4464 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4464 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe 4360 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4360 4464 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe 87 PID 4464 wrote to memory of 4360 4464 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe 87 PID 4464 wrote to memory of 4360 4464 e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\e78730d6016835d4303e1d187bed9501_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e78730d6016835d4303e1d187bed9501_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5db183ac600a2ce596c53d3fe1dd4d45c
SHA170372173140b2a159d444ad80e5ef7e4d05e4cbc
SHA2563e8b7c7709e79f221386de87ffaefe79ac6f7c37be1c2680d5856b2c8071d1b5
SHA5128e70c6295da5fa67dbaa36e86a260f4f9ff1a76c39df4dc9d8002cb68c16eab9eb4feea5f3ba046c3f0a4d0a9c48701f994ce03f46f325042e3a5cec39f0b789