Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe
-
Size
385KB
-
MD5
f4f08150a94c6333dc0acbc5cdeea1a5
-
SHA1
5bfeb461415720da5bf996f9a3270852e1281f4c
-
SHA256
7b9c76c111ca5352c87297376722200a5ff15f643a91565976a5262be4b32bd0
-
SHA512
6fe059885e2a657de36f5c9d50847e16c20c240b7e596a778592d107fc923d7c2bf4cd6effb146ff5eef9dc99ba5d15051963d44d557b773c06a806819af4065
-
SSDEEP
6144:zhF9gUzjmJS43cZYbFtUk+KmWmyzrhbxD/qjBAynSBP8EINFajYRedqQuHuiFTdi:zdb+JZcWrhbJqaMdfs9BApJSnB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1552 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1552 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3724 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3724 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe 1552 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3724 wrote to memory of 1552 3724 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe 86 PID 3724 wrote to memory of 1552 3724 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe 86 PID 3724 wrote to memory of 1552 3724 f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f4f08150a94c6333dc0acbc5cdeea1a5_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5dc0ae96f86adf68b08d4f4aabdf75315
SHA1a9070561dc7fb7b4ae0af3e3eca0ebcd0564260f
SHA2567d63b090525add85b6ede53c794a6193b3a420ac355c844fe8b66570d409f7f9
SHA512c11a1b45c22645147209817a8a07a8b9bc92df1e71887a69352ba25eb149d089b8de85902367869c2c4b72d57b0326a59d9f811f87efe2eb4d4aadd118d83303