Analysis
-
max time kernel
95s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
f6390702d11b15540637f5220e73911e_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f6390702d11b15540637f5220e73911e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6390702d11b15540637f5220e73911e_JaffaCakes118.exe
-
Size
506KB
-
MD5
f6390702d11b15540637f5220e73911e
-
SHA1
5653b4c8d83fd790eaf57bef37959550de37c3b9
-
SHA256
f60f1180dc02f79fbf4099df886ab702b80437ba91988a30c7278dd0f9533c86
-
SHA512
77b7a19d1675f5bd5bca725fe705f6b13e18e0681939b440794a2f10a8fa2735b675cdae5e4a93578585cb8ab2df64924cd2bcf70fcec1aa501ee217c642b7f8
-
SSDEEP
12288:AemQ3EGnPp6COnYecpYtemUBS/KYhS3kmAiEemNXh:A1Q3EePXqtcqemUy7mAXrNR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 16 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4720 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4720 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3172 4720 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 84 PID 4720 wrote to memory of 3172 4720 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 84 PID 4720 wrote to memory of 3172 4720 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 84 PID 3172 wrote to memory of 4124 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 88 PID 3172 wrote to memory of 4124 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 88 PID 3172 wrote to memory of 4124 3172 f6390702d11b15540637f5220e73911e_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f6390702d11b15540637f5220e73911e_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD51fe880abe03d6ef5caebffa65c7cf850
SHA149e547e7fd5100396285645f6a13823d3adc9fe2
SHA2563a95e6d3ea73ac9fa0bcc1367b89069370cd696f08458c8ae376c847ce9406f8
SHA51241567e007cecedeb26cd1ec594cf11630de1c1a2d5e8ed17243cdb217bd5f9137ec44683a4894dd153127cb29d7b5aef79f75dfe6f010de7e75efb427734c841