Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe
-
Size
385KB
-
MD5
e7acb2498d165c67b43c9f0211884763
-
SHA1
832393b552b6696469ceeee807817fcfaaf0c886
-
SHA256
0592531157f1807395a0b3aee37c6b842c7ce70d38bd74dad6fb9984f96644a4
-
SHA512
74cd1ca7131ed9cf4795f1770db6321462b9702298c7683f3e8919d3777de31a83589da9fb1b355eafdd8944242875c6d8bbf106f4b3f8521375af10e36f54f7
-
SSDEEP
6144:OyIOkeObZKif5qEQlxIvj3867ESOGkxj8ixWWwi76jNXKnV6HqrbeAGCaP8RY/WB:OSKj5VQDITtHOG+DlUAA9AV9YevLB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4576 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4576 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe 1216 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1216 4576 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe 86 PID 4576 wrote to memory of 1216 4576 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe 86 PID 4576 wrote to memory of 1216 4576 e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e7acb2498d165c67b43c9f0211884763_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f9628c462b519832eace0c24db94a710
SHA1b007e5159e0a2a51aae504e9e83aa9ace6fbde44
SHA256a69b9b5c36172d55a7b29940e0de09b2857dae61e4c9b974d758858020ad4c9a
SHA5127285e37a79a4dc71dfe08dd661a31d5beaf249ad7af6c97908bc79f25a5b0c9523bbba139352b158faa5aa4ef10df2ea4719ef7fb7723e7ad039e6772cff26a5