Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 05:46

General

  • Target

    e95c5dbb660343dbddf7c1c177c38981_JaffaCakes118.exe

  • Size

    302KB

  • MD5

    e95c5dbb660343dbddf7c1c177c38981

  • SHA1

    bd664d19bdcc06d36623c6fc8c0e672f17ec7bf8

  • SHA256

    b357d968220a828d2da68df8e2cdf77b7b3d1aa602d7f4be3e73769149d9eb16

  • SHA512

    ffc9627112969efe0ef35ac5e0c7d0e262bb8af0126f28594154917246791d8ae0f29968b1d2e01c72300b8d45e8a49dbc9946942ee118c930c688b404c399ce

  • SSDEEP

    3072:LMSqVKi27sdhM4I7TbY1FG/RsURM7gnDqIciZUkjYikxfGBwDHzhkqa22N+rQC6k:/5sdhMr/buFGSQMcnD/nPbBwDV422mQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e95c5dbb660343dbddf7c1c177c38981_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e95c5dbb660343dbddf7c1c177c38981_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\e95c5dbb660343dbddf7c1c177c38981_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e95c5dbb660343dbddf7c1c177c38981_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4076
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=764 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\e95c5dbb660343dbddf7c1c177c38981_JaffaCakes118.exe

      Filesize

      302KB

      MD5

      54439f08f0d7222b58880351805bacd1

      SHA1

      2dfa4647f3f9a55a1119a527f41e029a9e9750d8

      SHA256

      65124eee3481713c0682a8c86a2c2808439c9968076185174762c4fcdd416838

      SHA512

      ba09b84575a0c7d31e5731ab1d3b3ee5c53ee57fe5c2026fdc1f33a1d043ae8b324a0d55d382c3331b9d57e54a80a0b2ef372e14eded6b40c74ed0334a6b127b

    • memory/3068-0-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/3068-1-0x0000000000100000-0x0000000000131000-memory.dmp

      Filesize

      196KB

    • memory/3068-2-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3068-13-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4076-14-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/4076-16-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4076-15-0x00000000015B0000-0x00000000015E1000-memory.dmp

      Filesize

      196KB

    • memory/4076-31-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB