Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 04:05

General

  • Target

    fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    fbe2fa64584b9162882bb4526f934fb5

  • SHA1

    e6d5194b8d74541ed3218e1174f6d6dabd6117c0

  • SHA256

    c7a36594e0506044730537e5bd206164543cc5d27b993ce547d63a4e3fd4a1d8

  • SHA512

    49b08814f1db87af56f6d5c585f148cb32e3b505e816b9b52cac9a26946d66767722bb8b3ec449f061650a1ac10c1f23d3f7a5e9c1dfbdb60b1361ea397e6b52

  • SSDEEP

    24576:2PouO3rHX4RhZRdKAVGTTUNAcjukL2G0228xjxlukflKtJ4LcjukL2Y:c/O3rHoRh3QAVGvUNAcakLr0n8J39fEZ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe" /TN MJu5Ub8Eff50 /F
        3⤵
        • Creates scheduled task(s)
        PID:1980
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN MJu5Ub8Eff50 > C:\Users\Admin\AppData\Local\Temp\dn4JMSD.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN MJu5Ub8Eff50
          4⤵
            PID:1964

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\dn4JMSD.xml

            Filesize

            1KB

            MD5

            c480f56eda35518c8d173457d30fd1c4

            SHA1

            e9f4a90b75474bb10e19d199e938212c9d3c0099

            SHA256

            2a26aafc4f4eaf4447ce64561e25d297114c2fdda3b82c19815046d9f38317f7

            SHA512

            94c5cb60d7a7a51c27a71934bb7a9c7836322a0d282d8694b559b0371806e5be0f2c25d7e0c36564a7e7f2070b3600f9a5d82fd48e056c971f07eafd48ee491b

          • C:\Users\Admin\AppData\Local\Temp\fbe2fa64584b9162882bb4526f934fb5_JaffaCakes118.exe

            Filesize

            1.5MB

            MD5

            989363d9fd40c0248d1b3dc08e3e6095

            SHA1

            6ceedf23cb6f9924cb823b650d9c81d411b7eda9

            SHA256

            835802400cec0e5d8a46d5cd7e9af0260537584fb17455878568e9091e8ae138

            SHA512

            f0d1bd2d231d364a75f97cf9e477f0db0baa8fb92fa119e13da226eb1b58bf6b0f07dfc9e6545a5d1ef6138dad74bb04f121103e7915d52a3400c3b4aef48f1f

          • memory/2336-0-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/2336-1-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2336-7-0x00000000001A0000-0x000000000021E000-memory.dmp

            Filesize

            504KB

          • memory/2336-15-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/2368-17-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/2368-20-0x0000000022D90000-0x0000000022E0E000-memory.dmp

            Filesize

            504KB

          • memory/2368-26-0x0000000000470000-0x00000000004DB000-memory.dmp

            Filesize

            428KB

          • memory/2368-25-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2368-53-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB