Resubmissions

18/04/2024, 06:16

240418-g1zfeseg6y 7

18/04/2024, 06:15

240418-gz18madd25 7

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 06:15

General

  • Target

    f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe

  • Size

    1010KB

  • MD5

    f76ea8df3c1519be6786c7da6fe97bd8

  • SHA1

    56d57b5d1fb7ea80ddce839f96d403a6e0f97cc9

  • SHA256

    5c3e98fc979cb4c65e0e2da9aa484b84eade4e1923801dc136a46d2afed775d8

  • SHA512

    cbbb620b1516c6ff68c72badc594d303b285f39b1bdbd7403e0d1b80bea6d309aba8867c02c59ef4c278886a5ecc2acd8a311780f62126e1ccc893aaf978fd53

  • SSDEEP

    12288:lFpBAUZPfsSE99n0YTfm6hiYc5plDFwrilMiYTfm:lSU+9+mfduvlB7lbmf

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f76ea8df3c1519be6786c7da6fe97bd8_JaffaCakes118.exe

    Filesize

    1010KB

    MD5

    fff1a1ad24c238d0e799101a68d40e42

    SHA1

    0e38e7d4ca3b8fd500aebde55d820961c1c9f7c7

    SHA256

    291a9ad96aefd5ab79581f2076fa97e0a7f0e948bdd33d3f0d730ab97d5ba5e5

    SHA512

    92dbee407e72c1bae3faf65124329dac40572935f6ba539026f1c03b79ebc52d2f14ce4af54152aa3a7e9494fe378861d6d010299244fbabf6b613c931b1c940

  • memory/2660-14-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/2660-15-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2660-16-0x0000000001500000-0x0000000001533000-memory.dmp

    Filesize

    204KB

  • memory/2660-21-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2660-24-0x0000000004E90000-0x0000000004EE0000-memory.dmp

    Filesize

    320KB

  • memory/2660-28-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/3684-0-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/3684-1-0x0000000001500000-0x0000000001533000-memory.dmp

    Filesize

    204KB

  • memory/3684-2-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3684-13-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB