Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 00:09

General

  • Target

    f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe

  • Size

    7.8MB

  • MD5

    f4a0faa81aa3c5050215b9bffe56e7f2

  • SHA1

    f097be245c081302268e4fad0c3ebd7fc6ca7f35

  • SHA256

    0f06f7ba137c2a7cd0a931cbd45a9c45c3c598b22db66a9483000d0a32bd49f9

  • SHA512

    a88a74787767c27123cafc566827610b8fddb813bcbb68e744c7d498fe9c2cf3d19d2fe13074261d991b9dbad4a0389a2411d2894198da395cdee2de5daf2aa2

  • SSDEEP

    196608:Ln7ZlKdlirybMgOnkdlireGcAVixdlirybMgOnkdlirKGxiN1GdlirybMgOnkdlU:Ln1lQbMrniGhipbMrno1MbMrniGhipbq

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe" /TN ZBrUCVBB2555 /F
        3⤵
        • Creates scheduled task(s)
        PID:2520
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN ZBrUCVBB2555 > C:\Users\Admin\AppData\Local\Temp\RKZ51mE3y.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN ZBrUCVBB2555
          4⤵
            PID:2548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b31739fb70f474ff58b1663b296d92cf

      SHA1

      98fac128509d97ca013abdee7f304e51fd4e6092

      SHA256

      91897badcab7f50ff37201b0b6d5dcc0039e87f3ef1cc815e1074a9339532018

      SHA512

      1db3c18437717ce7f29acc3adac613a44f7d16f2dc34fe07d86458e83967c811a67a5dfa5dce1dcd7c4a26ce45522a510870cb11e0b4b58396f95dae80396c4e

    • C:\Users\Admin\AppData\Local\Temp\Cab31BC.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\RKZ51mE3y.xml

      Filesize

      1KB

      MD5

      edb704d4a3ddd4f955c3c6f689bbf617

      SHA1

      45061c064bb6e24cf6e01b2f1dea91f85aebb89d

      SHA256

      449704bebf58331c62c688ea0cfdfdc7be9fa7e7a9ece5ecea998e79d6a14fcf

      SHA512

      f83248944c303a7c948f2ed066c58d8258b117054f3deb6c3b5b417eee58b0f1e1a95bd1656585a60f53af66f4fccd7c6cdf93e95b979b778f021807ddb097bb

    • C:\Users\Admin\AppData\Local\Temp\Tar329E.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\f4a0faa81aa3c5050215b9bffe56e7f2_JaffaCakes118.exe

      Filesize

      7.8MB

      MD5

      33f55e51009dabc32a3869d4c957653e

      SHA1

      d2143b3bfc1dd36e8e7531c18fb983303162ff6c

      SHA256

      fc2207475885a0b9ae8dd66f33273a2d61e5c63e056143d50499952f4a360125

      SHA512

      cf7335fc8e2cc8b228d9486dff8367ebb61d8bca722544ece8b7fb4484d775d797418804eb5462e54349f20087a263fa11f04bafba7bcd467e475d5cf8f1048d

    • memory/1980-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1980-3-0x0000000000280000-0x00000000002FE000-memory.dmp

      Filesize

      504KB

    • memory/1980-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1980-16-0x0000000023FC0000-0x000000002421C000-memory.dmp

      Filesize

      2.4MB

    • memory/1980-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1980-134-0x0000000023FC0000-0x000000002421C000-memory.dmp

      Filesize

      2.4MB

    • memory/2456-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2456-28-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2456-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2456-22-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2456-135-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB