Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 14:20

General

  • Target

    ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe

  • Size

    821KB

  • MD5

    ea2e564b86d70d9f653a42db72a5d022

  • SHA1

    e8f9a1aa86a0098902d2d5cf5c7fda0113aeb73c

  • SHA256

    b56f6bd26f73931e60225f7a504751a739951cf3566d4b6ba68a03b3e85af366

  • SHA512

    95d0363a906aa1657497cd0c9e6f4b2feff38c80f0f1b23038ae18657f2dfe04f4dae8799c79732b2cfd4176dbed1bac395bccd61977182b3f2234bbbb028e7f

  • SSDEEP

    12288:5A3KJikcxo7+HBf8fLKOO4PopyEZxaMlFTAHflO9dJ5IECpxOokLZsCtQw1qEZ:5AzogBOO4P06MDAHcjukL2CDYO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe" /TN m5dCTfVw659f /F
        3⤵
        • Creates scheduled task(s)
        PID:2920
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN m5dCTfVw659f > C:\Users\Admin\AppData\Local\Temp\GqU2pETZ.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN m5dCTfVw659f
          4⤵
            PID:2672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\GqU2pETZ.xml

      Filesize

      1KB

      MD5

      34bd883c4382037a5a9a1b932f157c32

      SHA1

      83dd4e86b298cb6ca7fea6c4802c7fad856ac4da

      SHA256

      a32e24a33e8f183726b31150999a0521d5d9c23114638d503ae04bc51972af00

      SHA512

      8008dddee2aabab794aa6e4960dd406d2fe4ed1f3d113334ca52ab933892cbe264e059b934340dbf61af0133be17393fe8a415755d2ae6313c9da5ed3860db9d

    • \Users\Admin\AppData\Local\Temp\ea2e564b86d70d9f653a42db72a5d022_JaffaCakes118.exe

      Filesize

      821KB

      MD5

      5034e33e7e0b00cc82ebf601ede60f84

      SHA1

      556958e5005e217ee6281f6a0b79c5c9cd2451d6

      SHA256

      bcf90469ef46ea10aed20b4c2770363308a603b442f933b540b77bb4660684a1

      SHA512

      4e336bdfa0b74b41267e456c08358add6b89050772acc20e2c50a37b1ab395e6c14ff2e4891a62a3fc8f3d2977888357357f2914ac2f8999514d7cf4f5baba83

    • memory/2536-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2536-21-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/2536-31-0x0000000000220000-0x000000000028B000-memory.dmp

      Filesize

      428KB

    • memory/2536-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2536-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2692-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2692-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2692-3-0x00000000001E0000-0x000000000025E000-memory.dmp

      Filesize

      504KB

    • memory/2692-16-0x0000000022EC0000-0x000000002311C000-memory.dmp

      Filesize

      2.4MB

    • memory/2692-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB