Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe
-
Size
241KB
-
MD5
f4f3a5521a3461f8d9832113621716d7
-
SHA1
76392062940711409b38f79aca6056a6c9d22d01
-
SHA256
366d345be3c01639c389db383b4e882ba12c434e1e56226d69a7765bf107fee6
-
SHA512
5d3f5906b97026e103e55096a7b9364a245264de75b758036587891c8254b13467333886ee364422193ecee22d62e6d0e4686e732c3fae0d58bde167fea79725
-
SSDEEP
6144:H2US0QIGlkBKmIJasMbwzigFBrGP/cIbkkb:H2US0QIGlOKmSOb0fFdGsIYs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 18 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1632 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1632 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1540 1632 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 84 PID 1632 wrote to memory of 1540 1632 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 84 PID 1632 wrote to memory of 1540 1632 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 84 PID 1540 wrote to memory of 2456 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 87 PID 1540 wrote to memory of 2456 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 87 PID 1540 wrote to memory of 2456 1540 f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f4f3a5521a3461f8d9832113621716d7_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD568872a2b957bf3c62d31ccd7766acbb3
SHA1a5960c067a7b6f814455b7ef3346651fdee3dae0
SHA2563a4105699e23fd59ecc45ba63376ee16ce6f412f9b3a4f98ee37ebca70cdd442
SHA512defea65c1e321d87128cb7c15ca921515a21f245e7db04ed9ecb445d1eb4665e6a015c4a17ddcb050e04e1f023ee8f769baf470529fecae9b1387df7907364ab