Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 23:39

General

  • Target

    f494ca9b22feffc8c28e7424df9391ec_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    f494ca9b22feffc8c28e7424df9391ec

  • SHA1

    6c72b83a73aaea2c97bcf00605466713af5659d0

  • SHA256

    2c2b54b1e88ca705c1e91c6c0eb875e19a112548cc8c1e4f4da7f6ff6cc2321a

  • SHA512

    d56674d29588d27f26550b1d41ec4ad322b2c1ea521b95db7e43f5aee810ca8e83301fd4b12dd0f2f7051953776423982c8acbf69fe7d886dd82933ced7a9fbf

  • SSDEEP

    12288:YtRNLFfjtxb4bzHSU+zbnZv7gWhKxeSA10rLYmYsvrexw8YQKVB:YpLFrroHW+nxebmJVviG8YQ2B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f494ca9b22feffc8c28e7424df9391ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f494ca9b22feffc8c28e7424df9391ec_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\f494ca9b22feffc8c28e7424df9391ec_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f494ca9b22feffc8c28e7424df9391ec_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\f494ca9b22feffc8c28e7424df9391ec_JaffaCakes118.exe

          Filesize

          385KB

          MD5

          48bc675b56732ca4be3f28d495c84423

          SHA1

          ff260db099ee602dae3aad31e4edd3b1face7915

          SHA256

          3538b38c3eeeb61dbb29530aa96a380d09515202a2c9ae23b40987629b320307

          SHA512

          fdac463059c4c752131141dbc6ccb865f3e7c86b9bdcbbb2c0e55f94b5989c2ee10b81acb2969477868bb80dd4481ffd53d74a79e0d5eee00ef14f64f7ee3add

        • memory/1060-27-0x0000000002C90000-0x0000000002CEF000-memory.dmp

          Filesize

          380KB

        • memory/1060-17-0x0000000000340000-0x00000000003A6000-memory.dmp

          Filesize

          408KB

        • memory/1060-20-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1060-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1060-45-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1060-51-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1060-49-0x000000000ED40000-0x000000000ED7C000-memory.dmp

          Filesize

          240KB

        • memory/1676-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1676-2-0x0000000000190000-0x00000000001F6000-memory.dmp

          Filesize

          408KB

        • memory/1676-14-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/1676-12-0x0000000000200000-0x0000000000266000-memory.dmp

          Filesize

          408KB

        • memory/1676-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB