Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 01:41

General

  • Target

    fba5e98185ff2194c1c17474681eeb6f_JaffaCakes118.exe

  • Size

    302KB

  • MD5

    fba5e98185ff2194c1c17474681eeb6f

  • SHA1

    28c633db30851bf4fa10b51dbaef905267847c71

  • SHA256

    8f1562b036a7214af0d000b0f726423dbf5a8ff2e2b2cf506de2d064ee0db758

  • SHA512

    fab0362f3244bc750e591b39be5460bb7401ff7f974061597784a96743bfb27a7d093cfacfc47ec025bc53266348bfe945443109b3ba3569023db6585b14d7c2

  • SSDEEP

    6144:Hzvnz65zJqxJPVqk6GfhlGhwwhFLvVh3hq14tAKxmQ:NnsEihwyX5hcoxm

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fba5e98185ff2194c1c17474681eeb6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fba5e98185ff2194c1c17474681eeb6f_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\fba5e98185ff2194c1c17474681eeb6f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fba5e98185ff2194c1c17474681eeb6f_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fba5e98185ff2194c1c17474681eeb6f_JaffaCakes118.exe

    Filesize

    302KB

    MD5

    6d2b751b40c52ab9a42cfb342fadd013

    SHA1

    2f4e4430826864b37b64b978c511e4f1505a904b

    SHA256

    c2789384808d81a2278007376c4a81aa6c1c5fa07b29e48e9e695c5a73b8c447

    SHA512

    316da5c408aa5988deffa8773c3b24f27a1960159909e14e84b10ae2cea7fba56331ce4c789f5bbb1f8cf7e4bd072f22883884066e4aaf361ca0e0fa0a9433bc

  • memory/1156-14-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/1156-15-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1156-16-0x0000000000100000-0x0000000000131000-memory.dmp

    Filesize

    196KB

  • memory/1156-42-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2264-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2264-1-0x0000000000100000-0x0000000000131000-memory.dmp

    Filesize

    196KB

  • memory/2264-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2264-13-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB