Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 21:22

General

  • Target

    f8c72e813f5d289809bee9280f389fa2_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    f8c72e813f5d289809bee9280f389fa2

  • SHA1

    e57ced44b3c980967f289dd27ce0670a415365da

  • SHA256

    fe08e2885152a95de4f49b2ab48ffab0daa90c51f3ccebe05f25318aeca6b325

  • SHA512

    eae6732c47c0ebfd1f3d461decf44aebe4b8744f82bfedda55f4341dcf43154f4ca69d55f6adb513ad199ab133a4e5671574dbcbff1dd67974dea81e19920e7f

  • SSDEEP

    12288:RQtRc6LXaCa2oGOnud49L7lh+4N9WP8LOlB:gcKKsmudg7lh+W9ANB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8c72e813f5d289809bee9280f389fa2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f8c72e813f5d289809bee9280f389fa2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\f8c72e813f5d289809bee9280f389fa2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f8c72e813f5d289809bee9280f389fa2_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\f8c72e813f5d289809bee9280f389fa2_JaffaCakes118.exe

          Filesize

          385KB

          MD5

          d4ec8676ca353789574e21cc6bb3c475

          SHA1

          32122a3499e1606abf7365cf277f1adc14a89f30

          SHA256

          6b46fc7d1a3b229f2c2c9cebcc8b73ac2d7245e9f9cc037d3c5b552f5885762e

          SHA512

          7b93a1c84447de0531a751e49bee934861c898c5ff9f2a42a9498bca88fcee03e62e06922837856b59a7f23ab411101eccf6587a032cc814b4fa72c6bdb4efeb

        • memory/2408-20-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2408-17-0x0000000000360000-0x00000000003C6000-memory.dmp

          Filesize

          408KB

        • memory/2408-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2408-25-0x0000000002C10000-0x0000000002C6F000-memory.dmp

          Filesize

          380KB

        • memory/2408-45-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2408-50-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2408-51-0x000000000EF00000-0x000000000EF3C000-memory.dmp

          Filesize

          240KB

        • memory/2864-2-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2864-1-0x0000000000310000-0x0000000000376000-memory.dmp

          Filesize

          408KB

        • memory/2864-14-0x0000000000380000-0x00000000003E6000-memory.dmp

          Filesize

          408KB

        • memory/2864-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2864-13-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB