Resubmissions

18/04/2024, 06:16

240418-g1zfeseg6y 7

18/04/2024, 06:15

240418-gz18madd25 7

Analysis

  • max time kernel
    93s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 06:16

General

  • Target

    f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe

  • Size

    1010KB

  • MD5

    f76ea8df3c1519be6786c7da6fe97bd8

  • SHA1

    56d57b5d1fb7ea80ddce839f96d403a6e0f97cc9

  • SHA256

    5c3e98fc979cb4c65e0e2da9aa484b84eade4e1923801dc136a46d2afed775d8

  • SHA512

    cbbb620b1516c6ff68c72badc594d303b285f39b1bdbd7403e0d1b80bea6d309aba8867c02c59ef4c278886a5ecc2acd8a311780f62126e1ccc893aaf978fd53

  • SSDEEP

    12288:lFpBAUZPfsSE99n0YTfm6hiYc5plDFwrilMiYTfm:lSU+9+mfduvlB7lbmf

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe

    Filesize

    1010KB

    MD5

    5d347f41e7d605ef4389166340a2306e

    SHA1

    5de48a9f7e2041a49ec9bd8eb67da23400d2c2ec

    SHA256

    94ee3a74b445be9fe4d506f93acf3fe6d9f275ecdbda8654a9c741b9320c400c

    SHA512

    1c24ca6d4513b4227a7db38a6060771309fbbf17a9e00a298bd701eabf1bc72d41c0bf931a127bb944d63782104da6386eea4fbfbe22af9e2c0dfc3051071b11

  • memory/1748-0-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/1748-1-0x0000000000110000-0x0000000000143000-memory.dmp

    Filesize

    204KB

  • memory/1748-2-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1748-12-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3032-13-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/3032-14-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3032-15-0x0000000001500000-0x0000000001533000-memory.dmp

    Filesize

    204KB

  • memory/3032-20-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3032-23-0x0000000001580000-0x00000000015D0000-memory.dmp

    Filesize

    320KB

  • memory/3032-27-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB