Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 03:12

General

  • Target

    ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe

  • Size

    7.8MB

  • MD5

    ec8c7b7cc32144636c84d8951b3e694b

  • SHA1

    af4437e0ad6fffcb4244baa32bb652ec5c3cb924

  • SHA256

    b441aa1be73cbb14b82b1545f82e677264f454fca0feea4004dfbb54d83ff085

  • SHA512

    c1d9180b91551bd98fdf2226f49b94aaeded3ec55bee60e94cc129949ae6ec804617b5b0dbfc6131e13d03111beabf8c38893b14d71bcdd7538f8c1db90a1f30

  • SSDEEP

    196608:JHqQJYdlirybMgOnkdlirnzE9TPPRdlirybMgOnkdlir4AV+I3dlirybMgOnkdlO:FqXbMrnzzE9DRbMrn02jbMrnzzE9DRbq

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe" /TN oC7ri3HGb305 /F
        3⤵
        • Creates scheduled task(s)
        PID:2560
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN oC7ri3HGb305 > C:\Users\Admin\AppData\Local\Temp\sVf2ntBI.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN oC7ri3HGb305
          4⤵
            PID:2772

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ec8c7b7cc32144636c84d8951b3e694b_JaffaCakes118.exe

            Filesize

            7.8MB

            MD5

            d3e788ca06b04b693c1ec39984a59f13

            SHA1

            361455d228ba962836605060568645a2d5977871

            SHA256

            b05c5fa4d420bcc3b52891b47afd17b6df68d9aea226f7fecadd7d83db3c989e

            SHA512

            f21b693eb197ad3b274c8d849be2c45c89624cf59ec7f5562ae3240729a567bca623b1031a7b19228cb74b61cbb9030c4f1a4feffb99e960b8c926f231e259a3

          • C:\Users\Admin\AppData\Local\Temp\sVf2ntBI.xml

            Filesize

            1KB

            MD5

            9f2d75da2dbd2d4638b7a5b4ca6e890d

            SHA1

            c2b0ee902b262091b1faa255550c7b927ff4dc28

            SHA256

            0a5fce401e06ca0d68f122ac2fbcf0c81e62bec3bc1749b33c44e3da6820b42b

            SHA512

            bb6a43aea9b29f0ade010af8e917f97c5b4aec21f017642e5dece60ba55502a3d5adb0ed5d12bd60789b1724e2e7dabbaf8d5bde9ec9d591955d67ec3d9aa381

          • memory/856-1-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/856-4-0x0000000022D90000-0x0000000022E0E000-memory.dmp

            Filesize

            504KB

          • memory/856-16-0x0000000023DF0000-0x000000002404C000-memory.dmp

            Filesize

            2.4MB

          • memory/856-15-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/856-0-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/856-53-0x0000000023DF0000-0x000000002404C000-memory.dmp

            Filesize

            2.4MB

          • memory/2200-20-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/2200-27-0x00000000002D0000-0x000000000033B000-memory.dmp

            Filesize

            428KB

          • memory/2200-26-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2200-22-0x0000000000220000-0x000000000029E000-memory.dmp

            Filesize

            504KB

          • memory/2200-54-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB