Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe
-
Size
506KB
-
MD5
f61c9dbd178f703e0977631e1a7afbd6
-
SHA1
941235f27f9fdf14d185d564180a707735cce792
-
SHA256
fda34c8502d33c948efa3f3182acfbe6a24d83103f4eb83a70aad62f96cb5a14
-
SHA512
97bd7750d95ec84d5093d8f4a2fbb6e9401db0c67d6b65d18b3737c75a58569fb857bf8a8f241e1fb28bff797d2f58b78a2bb916e8a2d5ec037cc6fc5d47dd07
-
SSDEEP
12288:UywVE8fIUin2q+bq2B+B+nGSaVs0IfKQg3RD533:P8PREagPeK73RD533
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 17 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 444 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 444 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 444 wrote to memory of 1800 444 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 83 PID 444 wrote to memory of 1800 444 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 83 PID 444 wrote to memory of 1800 444 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 83 PID 1800 wrote to memory of 560 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 87 PID 1800 wrote to memory of 560 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 87 PID 1800 wrote to memory of 560 1800 f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f61c9dbd178f703e0977631e1a7afbd6_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD58ee10c0e67ef3f27b17af5ba9b6dbef5
SHA110a80b2ff3ddb784937f043b26a5bb41a15d14bb
SHA256147d6ad4e3d03e28054c4b916e6575b5f64ca05bbd4a7036da2b1fd5850084db
SHA5120b5d81ae5ebb6eb5328d91876684b0850e610399e2a500e8f886427a7d8b0ba610d761dd21c58972857ff63cfb716f14eb2cbabb0cadac49d309fbf88e2f8d72