Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
f6390702d11b15540637f5220e73911e_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f6390702d11b15540637f5220e73911e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6390702d11b15540637f5220e73911e_JaffaCakes118.exe
-
Size
506KB
-
MD5
f6390702d11b15540637f5220e73911e
-
SHA1
5653b4c8d83fd790eaf57bef37959550de37c3b9
-
SHA256
f60f1180dc02f79fbf4099df886ab702b80437ba91988a30c7278dd0f9533c86
-
SHA512
77b7a19d1675f5bd5bca725fe705f6b13e18e0681939b440794a2f10a8fa2735b675cdae5e4a93578585cb8ab2df64924cd2bcf70fcec1aa501ee217c642b7f8
-
SSDEEP
12288:AemQ3EGnPp6COnYecpYtemUBS/KYhS3kmAiEemNXh:A1Q3EePXqtcqemUy7mAXrNR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2516 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2516 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2516 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2516 2748 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 28 PID 2516 wrote to memory of 2756 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 29 PID 2516 wrote to memory of 2756 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 29 PID 2516 wrote to memory of 2756 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 29 PID 2516 wrote to memory of 2756 2516 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD58da4d0875bb89be70c55a4ad513c9433
SHA1827bd75f2afd0cde0cefd75681e990c5a1ba92b7
SHA256e695913767245df70be7edbf4cb1a0f05cdb72888884e39803c0b01e91517ea2
SHA5125dcbfe0edb9b8f5f0875284fc9252369c2e68f3c9380a1948b92e2d0dc5a8a1b3e8a25948ada2d23d386c4d9c438e8a98be2ab22dc3b67ed068fa3be3326cc66