Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe
-
Size
385KB
-
MD5
ebf320b6b11829799e0b3584cb3328fe
-
SHA1
063db10196dbabcd75e438e79bf88f779522a064
-
SHA256
508521fd7d9500b95c5ce2d34a4ef0a561e4bb27f55ecb6429a5a7e6e4b2494d
-
SHA512
23674c07ab294de79731a093a429bd65968a71ee4aad809aae68e3487a6e2f8d144584b1343bd3eef325dd9869156b05b9e0bfd1831c1b162f89947257fe0d30
-
SSDEEP
6144:fDxtcNK9kXt+ZswkbDBlkw488W3VzHuVhBz/0rj4dJVdbpmF7hhtKB:f7cNQkIZszbDbh3VzH+/z/0ry/dbMBUB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3248 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3248 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 11 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3892 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3892 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe 3248 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3892 wrote to memory of 3248 3892 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe 90 PID 3892 wrote to memory of 3248 3892 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe 90 PID 3892 wrote to memory of 3248 3892 ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3948 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56e4acc4a442b34d99bd54c8f00eb9d8f
SHA1ed296a33cc988dbc81501c964e0236b9d879f87c
SHA2567de754fdffca35231a140f3731614d3ee905f4c311df107b097d0e97fd9d89a6
SHA51214c7505b7281e01f4be7237cdc7ab2cb030aa21d334370b028c1f09f8f5441c54288a656d1d90facf53bd9485465676ab41d2414ccbbfcce8e2ea63d12aed477