Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 23:05

General

  • Target

    f4865a6d7221b650c0e39e704fbab5db_JaffaCakes118.exe

  • Size

    907KB

  • MD5

    f4865a6d7221b650c0e39e704fbab5db

  • SHA1

    1ba67e8a294946ce5d97126565bc1297324df145

  • SHA256

    9028ffa82c9d8ce713f8c3552e1a367fcd1b29769fb516dec6f6e5c701d6a200

  • SHA512

    710b0edd1d8c66d79515032a91a48f99f0fa260dd2a7aac7f6fe813802e30947068df80dcbcbd0ff541ea342397994f860a351759697fffe0a97c8c437979d6c

  • SSDEEP

    12288:w46zIwCqzeUvtcd1CeTOUjD0ImwZU3PxcNn8E2G1wHOer238jVDa/ZS1:I5iJVS2wImwZU3Pxgn8Eh1Ka/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4865a6d7221b650c0e39e704fbab5db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4865a6d7221b650c0e39e704fbab5db_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\f4865a6d7221b650c0e39e704fbab5db_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f4865a6d7221b650c0e39e704fbab5db_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\f4865a6d7221b650c0e39e704fbab5db_JaffaCakes118.exe

    Filesize

    907KB

    MD5

    ac60ce04cfc7965d5fdc85028638a5c8

    SHA1

    94647265f1247cf26dc6c58da17525d8f6b94a0e

    SHA256

    df3c0ea5b990c7abf6024cd28273f69a82ccb785aaff74977e0049491c5ee410

    SHA512

    76ae226ecbb019449c803d39d00c1c68b30bf343a292ecd3042a7128422ae1e8ada40b500641fab604df40d816dd9d786d903f778f99fbe82d754390ef1c837f

  • memory/2372-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2372-2-0x00000000014F0000-0x00000000015D8000-memory.dmp

    Filesize

    928KB

  • memory/2372-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2372-12-0x0000000003290000-0x0000000003378000-memory.dmp

    Filesize

    928KB

  • memory/2372-14-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3060-17-0x00000000014F0000-0x00000000015D8000-memory.dmp

    Filesize

    928KB

  • memory/3060-22-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/3060-25-0x0000000002FE0000-0x000000000309B000-memory.dmp

    Filesize

    748KB

  • memory/3060-44-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/3060-46-0x000000000EC40000-0x000000000ECD8000-memory.dmp

    Filesize

    608KB