Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 20:43

General

  • Target

    ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    ebf320b6b11829799e0b3584cb3328fe

  • SHA1

    063db10196dbabcd75e438e79bf88f779522a064

  • SHA256

    508521fd7d9500b95c5ce2d34a4ef0a561e4bb27f55ecb6429a5a7e6e4b2494d

  • SHA512

    23674c07ab294de79731a093a429bd65968a71ee4aad809aae68e3487a6e2f8d144584b1343bd3eef325dd9869156b05b9e0bfd1831c1b162f89947257fe0d30

  • SSDEEP

    6144:fDxtcNK9kXt+ZswkbDBlkw488W3VzHuVhBz/0rj4dJVdbpmF7hhtKB:f7cNQkIZszbDbh3VzH+/z/0ry/dbMBUB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3248
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3948 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ebf320b6b11829799e0b3584cb3328fe_JaffaCakes118.exe

      Filesize

      385KB

      MD5

      6e4acc4a442b34d99bd54c8f00eb9d8f

      SHA1

      ed296a33cc988dbc81501c964e0236b9d879f87c

      SHA256

      7de754fdffca35231a140f3731614d3ee905f4c311df107b097d0e97fd9d89a6

      SHA512

      14c7505b7281e01f4be7237cdc7ab2cb030aa21d334370b028c1f09f8f5441c54288a656d1d90facf53bd9485465676ab41d2414ccbbfcce8e2ea63d12aed477

    • memory/3248-13-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/3248-14-0x00000000015E0000-0x0000000001646000-memory.dmp

      Filesize

      408KB

    • memory/3248-20-0x0000000004E80000-0x0000000004EDF000-memory.dmp

      Filesize

      380KB

    • memory/3248-21-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3248-30-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/3248-35-0x000000000C840000-0x000000000C87C000-memory.dmp

      Filesize

      240KB

    • memory/3248-36-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/3892-0-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/3892-1-0x0000000001470000-0x00000000014D6000-memory.dmp

      Filesize

      408KB

    • memory/3892-2-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/3892-11-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB