Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 09:46

General

  • Target

    eac950d65d66b612f2e7069b07f9e269_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    eac950d65d66b612f2e7069b07f9e269

  • SHA1

    ac61d1e7bec48db848bc7da90145f9a980c91ac5

  • SHA256

    2cf344d5de57e48e1091976c7ff49a2b0926de95c530a8f215050624751abd8f

  • SHA512

    6da4bd114201e556b15accb1467075d7522e1885b597c1fd0f8aaf25d79c5505e37b90815a77dd8370572537ac9a1f3db088db5042e988b0a31d5a8edd989918

  • SSDEEP

    6144:URjlVxDe8p6MXrpYjoq+wjymgPT4K1lV8OLJnnTYsaX0l+OHFdIBHzB:URjlVxymysqTHgPP1n8OLJ0sztItB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac950d65d66b612f2e7069b07f9e269_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac950d65d66b612f2e7069b07f9e269_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\eac950d65d66b612f2e7069b07f9e269_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\eac950d65d66b612f2e7069b07f9e269_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eac950d65d66b612f2e7069b07f9e269_JaffaCakes118.exe

    Filesize

    385KB

    MD5

    fb7a60858b5546d948765a489b8c3159

    SHA1

    177a7333d3198e2021a79f4ae56bbb147c50953a

    SHA256

    5dda544b4e6543029ad89c732c3ff4e575a76d4385ebc034038f9767bd27ec9a

    SHA512

    e6004a28b6de46652ac905e1fbaab38608672c5b18ae35f8e64d3d25110276c35a793227376492e2652875fdc3d9829cf0e10c309fe19467fd2244e3b8c0ce48

  • memory/1624-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1624-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1624-1-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/1624-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3724-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3724-16-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/3724-20-0x0000000004EB0000-0x0000000004F0F000-memory.dmp

    Filesize

    380KB

  • memory/3724-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3724-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3724-37-0x000000000C850000-0x000000000C88C000-memory.dmp

    Filesize

    240KB

  • memory/3724-38-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB