Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe
-
Size
907KB
-
MD5
f3bc33996dbb3b374df50bcaa970969f
-
SHA1
dabcf1a3c62d32aff0f9c98381fad4619dab1698
-
SHA256
9c71bb9009e94932ba6d70c65e91dd43646654a3b313cd48473ba6d59a6b37ba
-
SHA512
f24768ee19552e1b282bd02cd88bdc3c93d69352c97a48cc5a4c9cdf11ecea7efaa26af92a00044277268ffdd33bf33a16e30a8b9a1d0f9d43b098070d04bd33
-
SSDEEP
24576:VW9sRuQOVHCYNta7CrjOj9eyBWCyCgzbPG0Tra/ZS1:w2miYN7rKBeyBWdCgzbPGwgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe 2252 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2252 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2252 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2252 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2252 2168 f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3bc33996dbb3b374df50bcaa970969f_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD591d250cafdebc9dc84d9206b0fa64e5a
SHA14605732faf691d015012f6f4d23e16ed2461cc02
SHA2561153e7f48455644e4b4e177086cf44c1ab84eeb91ded4d59239418fb838c4193
SHA5128df3a02046181590e3399c8465dcc9db9f6bcd72c34cf0b63431b1bd3a77c3a893f67f0af13f258a4df6da33135dafcda0bcda663028a0b33353d7d0076b0e3e