Analysis

  • max time kernel
    93s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 01:28

General

  • Target

    effb7cab009bd418f26b3583abcda58e_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    effb7cab009bd418f26b3583abcda58e

  • SHA1

    ee4af4fd4bb947c33617139b08f8d39599e28742

  • SHA256

    59065b9162d6e8876c3ea9eecb7f1b0a69534ae04f8ae22e92707cc97e39614b

  • SHA512

    4253af14d7078145ad9c08b19c3621db3c4026b6cebd959f55277227c4ddbfba3e85a64b68ab42d0e2b55a9b4f6f6a788b7b886bf1ec9eca80805568fb6006e1

  • SSDEEP

    6144:7JDBmfqcEB1AjzthP0Fkcf8VC82SZT5jVNfv1D0zi2yzGB:11HpAzYe1t2SZT5jVhvki2lB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\effb7cab009bd418f26b3583abcda58e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\effb7cab009bd418f26b3583abcda58e_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\effb7cab009bd418f26b3583abcda58e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\effb7cab009bd418f26b3583abcda58e_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\effb7cab009bd418f26b3583abcda58e_JaffaCakes118.exe

    Filesize

    385KB

    MD5

    abacbe724235cb5a909d40f6b74543fb

    SHA1

    4a98dde76a1f4891cbf9dc2063d4115c35eff889

    SHA256

    59cfcd76ba7d079035b2d891dba5f44d60625e58f6031fce90e48ce8b94d3159

    SHA512

    8ee29a7e2956c6ca18cb882f76dd088148bc9df276070912aa6ac9cec65e5af1233caa250f70577ea63e27ea260a1372d6550765bb8f5b4867008617e92eec7e

  • memory/2012-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2012-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/2012-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2012-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4892-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4892-15-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/4892-20-0x0000000004EE0000-0x0000000004F3F000-memory.dmp

    Filesize

    380KB

  • memory/4892-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4892-33-0x000000000C5D0000-0x000000000C60C000-memory.dmp

    Filesize

    240KB

  • memory/4892-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4892-38-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB