Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe
-
Size
1000KB
-
MD5
e99cfc504ae797f21a8c6f09f67259bb
-
SHA1
a3efbbed1cda9e47ee82c44cbf0ae03e4c60c930
-
SHA256
8f021b71ee951ef961e7d2103560d4366d7de676ae6f9183168f2586bfb4002f
-
SHA512
198f1edf845980a6a324ae6f576872a6dbd56a6394a1f37ab5552d16256d9f5020369dbb0b3d71f8b9d4b5a9160260b94626491462248bc3ce3b581e0ed4352d
-
SSDEEP
24576:O/9NDotnArDzwhT3qw7f9WaL1B+5vMiqt0gj2ed:OlRC8Kuef9DqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 16 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1584 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1584 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1584 wrote to memory of 3044 1584 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 85 PID 1584 wrote to memory of 3044 1584 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 85 PID 1584 wrote to memory of 3044 1584 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 85 PID 3044 wrote to memory of 4436 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 89 PID 3044 wrote to memory of 4436 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 89 PID 3044 wrote to memory of 4436 3044 e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e99cfc504ae797f21a8c6f09f67259bb_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5c1e8292bfb9ea69e6c12e8c6690b193c
SHA13ca63594e83cec822ab85a621a08cb78a0d54c97
SHA2564dbbf43123d16dd7a1ca052d4009408d5e2966b3459198bcafc8d7ae4235f5ad
SHA51252b4cff5d9c7cad10bebf716c972bfc1603db07eb910f6534ea01e70a864cf19a9637caafd1a14d6370a35ba4156ff5e0a049fd6d41e08a1d4d5b3df0ce6f1a0