Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe
-
Size
385KB
-
MD5
f237d81467076c00c5db9b4360758a4a
-
SHA1
f75120ee2a3fe6833456481b9afacbd75b954a6d
-
SHA256
b2a40e2d57a690db443740cb7c0c92c7de67fdd885eaccbea76918a49d43886a
-
SHA512
d4cbee353779ace3a460a8fd4af5e67027c3da05c868e44d7cf6641223266b17a65885dfc37c3526e52bb22ad9a3c6d24b9297ecf93f5a66aaf85a975034c9c5
-
SSDEEP
12288:qNAP2dK3/GY/wTAPfacKyZBF2/Wo6E71aB:xUW/TPixQBo/BaB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 824 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 824 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 pastebin.com 14 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1448 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1448 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe 824 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 824 1448 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe 84 PID 1448 wrote to memory of 824 1448 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe 84 PID 1448 wrote to memory of 824 1448 f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f237d81467076c00c5db9b4360758a4a_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD57163ba054df255665d4047a574ba313b
SHA10a942d946eab679796c56b18324a3cffb4ea0c38
SHA25654805fa104bc2a72148c76916d3e6832548f6f8f4567f15e72147683002bb5ad
SHA5123ab1bbafa62863c585d8369438e28b9291c5138936ce3de4a5759e6968300cd609debdb83cec95f321e136af4fc5d26765a139e9fda4920b735801c89edec987