Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 06:36

General

  • Target

    f7776b25b1aaa9cbd5e1f8eb3eb3a22b_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    f7776b25b1aaa9cbd5e1f8eb3eb3a22b

  • SHA1

    04967fa74b696d77525a016c38e1a02ef1bde946

  • SHA256

    800e43fa0f2d6d26babcabc4662af4852ab109c5a6dff407a8a03b557c4180f3

  • SHA512

    7813b199c89bb989411b218c64c8b2828acc7ec498ac0307cb21a75bd882f0e301e44887085482466eda6dd9f35d70ad93ee8cba9fa35d6848be24ca13d15574

  • SSDEEP

    6144:5AIugPXzaFY4ZFy7X0mKCKirQLkifuKxbdffxBWbCMsYQmsCP9H8alB:yAPXay7EmfPQwi/nB9YQm9Ph8kB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7776b25b1aaa9cbd5e1f8eb3eb3a22b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7776b25b1aaa9cbd5e1f8eb3eb3a22b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\f7776b25b1aaa9cbd5e1f8eb3eb3a22b_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f7776b25b1aaa9cbd5e1f8eb3eb3a22b_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\f7776b25b1aaa9cbd5e1f8eb3eb3a22b_JaffaCakes118.exe

          Filesize

          385KB

          MD5

          05c2ab3d99d49e3afa11cdb7b1591e74

          SHA1

          d971570bf8419bd6e24ee480b166a0152a1566d0

          SHA256

          f20622bb90500ac8f724ffc1a96e5e6b363557b42f0a2218d53c09ad9fe99505

          SHA512

          9ec7761cd90055d061888e065f83b7c94c98ac81caab5a908cb58540a1b2c7058d8f8b634e244a1925edeeb70926552e31c43e2bf297a778b0b20c89ff2b181e

        • memory/2156-14-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2156-6-0x0000000000250000-0x00000000002B6000-memory.dmp

          Filesize

          408KB

        • memory/2156-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2156-12-0x0000000002DA0000-0x0000000002E06000-memory.dmp

          Filesize

          408KB

        • memory/2156-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/3016-16-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/3016-19-0x0000000000390000-0x00000000003F6000-memory.dmp

          Filesize

          408KB

        • memory/3016-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/3016-26-0x0000000002D10000-0x0000000002D6F000-memory.dmp

          Filesize

          380KB

        • memory/3016-45-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3016-50-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3016-51-0x000000000E720000-0x000000000E75C000-memory.dmp

          Filesize

          240KB

        • memory/3016-52-0x000000000E720000-0x000000000E75C000-memory.dmp

          Filesize

          240KB