Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 18:43

General

  • Target

    e826f60975acc47db7315f497ecdf764_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    e826f60975acc47db7315f497ecdf764

  • SHA1

    9075ff0303a78ea28b84c49befb3b7cd7fcd2d07

  • SHA256

    be95982f224527fcf8f1d983a89aab5e75e420665851dc3d6de9326b59f5686e

  • SHA512

    49e19511864118aef647233f4cc13e7ec5259d135ea76de21b47d88e8ba812d32648a671780108bb7bdf5f75ccad7cc267400e8ced064e547aeddfb26a604e2d

  • SSDEEP

    6144:7K9vEppIou/c4DPn0vO7dooJKEUcbLkar09p/hT8/lJqiNKfB:7K9vYI6wPn0vsoK1109jTiOB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e826f60975acc47db7315f497ecdf764_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e826f60975acc47db7315f497ecdf764_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Users\Admin\AppData\Local\Temp\e826f60975acc47db7315f497ecdf764_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e826f60975acc47db7315f497ecdf764_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3948

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\e826f60975acc47db7315f497ecdf764_JaffaCakes118.exe

          Filesize

          385KB

          MD5

          797a74899ce64ee2f4250fd033c8cb17

          SHA1

          7c9aaea88e44087352f86e2630673a0b4d8e9353

          SHA256

          cacbc41b86bb4ca69abd0f5c4e9400eef9e5fbb854c8b253107d1a375be4497b

          SHA512

          994ab587596004a1e883341744cb71d3584f0b6e9d03bf6bef0c06105e842b140a6556e66da2134b2563f1968cc8cacc203f6aa918831d23982590edc4c32fb8

        • memory/680-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/680-1-0x00000000014D0000-0x0000000001536000-memory.dmp

          Filesize

          408KB

        • memory/680-2-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/680-11-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/3948-13-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/3948-14-0x0000000001610000-0x0000000001676000-memory.dmp

          Filesize

          408KB

        • memory/3948-20-0x0000000004EF0000-0x0000000004F4F000-memory.dmp

          Filesize

          380KB

        • memory/3948-21-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/3948-30-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3948-31-0x000000000B7C0000-0x000000000B7FC000-memory.dmp

          Filesize

          240KB

        • memory/3948-36-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB