Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe
-
Size
907KB
-
MD5
f4ba4438f741c7904ad3e217e6cc0567
-
SHA1
95833afa8adf1493b3db5eb426f884fdc394b63d
-
SHA256
129cfeea6c9324bfbe64ad8d0ce79c9b16510c72eb1dfcfd9be358002609e564
-
SHA512
a1ac9c2dd744a307075656aa65295e0665f9dd872c44ad830ceb040188156a6db5c817e69c96426e390e8ee19064b06e01240eb5ecaaa49bdeeabe61f6b81742
-
SSDEEP
24576:kI+J+EIyx2diS17+slyGdajtMt0bmTTTaKT6ta/ZS1:khxqrlyNE0b6XogS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1992 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe 1992 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1992 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe 29 PID 2204 wrote to memory of 1992 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe 29 PID 2204 wrote to memory of 1992 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe 29 PID 2204 wrote to memory of 1992 2204 f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f4ba4438f741c7904ad3e217e6cc0567_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5b1fe80046f9f839e383010172b4c8604
SHA15fc8297ee0ef5e7df64090253a0d0ad4d12aa60f
SHA2567425395fb3b2e93d2d4f374142c28ac3e846a150f21ab7b7bfed85316f5d3b01
SHA512377cada5fb0c94ae9bf6b8f9076876fcdccd34e4d375a90669faf68a92dfcdbd933c0e9a36c2100137a90ce4a7c60ba035b35ec09ce3568c147ee42df33ccd59