Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 16:15

General

  • Target

    edd5070183456de24c84d4e666e688f9_JaffaCakes118.exe

  • Size

    5.1MB

  • MD5

    edd5070183456de24c84d4e666e688f9

  • SHA1

    174febe498e064375080d919b2de01a2984c14c0

  • SHA256

    23b3bf4da7dcc814a9b507d6e8abde043ad08e411a995be9aa4b42112e316e35

  • SHA512

    c6a450c6153e2199b9cded0aade25479b148a99b0204c25140d269e8b16ba98b87a6a178008613d023ff889d70020e1b239d1ae0a683a308cdb90aa36e7ae20e

  • SSDEEP

    49152:wfuUshOBhYKvCotdNPP9X6sng3pEFwuay35bkrfg8FYri+ts5EjdZwaA9jCIFkA0:BhhOoKqod9uXm30g2yOEjjs9/g3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd5070183456de24c84d4e666e688f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edd5070183456de24c84d4e666e688f9_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Users\Admin\AppData\Local\Temp\edd5070183456de24c84d4e666e688f9_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\edd5070183456de24c84d4e666e688f9_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4104
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\edd5070183456de24c84d4e666e688f9_JaffaCakes118.exe

      Filesize

      5.1MB

      MD5

      06522440109c7adbd7d4de5020771d8d

      SHA1

      c0ca979b4cfda2d181ede3b6ecd62f0f867a6754

      SHA256

      1e63bf1bbaf4c1120ec40a02fad33201efd634b8ac5d3637423eb77a5eb0fb90

      SHA512

      cb68114ae1ffe055839100fc7f342c0a9f09f7b9ce4c5b559e6244b60223f0f57c0af26fe12449f9b23ae36cba025843acc4d5ac2af29518e208ec58b2617577

    • memory/4104-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

      Filesize

      9.6MB

    • memory/4104-15-0x0000000002130000-0x000000000238A000-memory.dmp

      Filesize

      2.4MB

    • memory/4104-33-0x0000000000400000-0x0000000000D9E000-memory.dmp

      Filesize

      9.6MB

    • memory/4820-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

      Filesize

      9.6MB

    • memory/4820-1-0x0000000002380000-0x00000000025DA000-memory.dmp

      Filesize

      2.4MB

    • memory/4820-2-0x0000000000400000-0x0000000000605000-memory.dmp

      Filesize

      2.0MB

    • memory/4820-13-0x0000000000400000-0x0000000000605000-memory.dmp

      Filesize

      2.0MB