Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe
-
Size
506KB
-
MD5
fc4cb02afc7e18fcbe77f8107d8e7c20
-
SHA1
26f2a35b8c87f4d08e7ef08636e6a72df7fe7265
-
SHA256
7eb78d128795a818f8e81f146a133965b6297acbd7c2a92493f3891164e9d453
-
SHA512
117f17f9038b08b41207c7e1684759f29de2ec4f77029c6281e4d25264e3945c593eba060ba605c41d67fc4914195d3d2bd9c4c08ca5629e595b21a9ab5135f2
-
SSDEEP
12288:DX1YZFh7Ha11XnTbqBBKSp5zZSim++hqFLh:DXKWXTWXKU6im3hq/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 pastebin.com 20 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2988 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2988 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4064 2988 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 87 PID 2988 wrote to memory of 4064 2988 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 87 PID 2988 wrote to memory of 4064 2988 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 87 PID 4064 wrote to memory of 2992 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 88 PID 4064 wrote to memory of 2992 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 88 PID 4064 wrote to memory of 2992 4064 fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\fc4cb02afc7e18fcbe77f8107d8e7c20_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD59d4825fa2ab9f520e9ea74d74c02fbb9
SHA139c123d36083bc6795d6ea1659ce02ac8454263b
SHA256693ba8f1ee573a55857b94cb5dd33f144396364dbf51013e53a03cb70936cc47
SHA51252231bce7b456e83c5b173082f3919ec4057b5739f154cb6eb4dad22f50804a742f7769c6f535f4bfda09d4e91ecf538a66a14eb885207fc1e2b398b061f5f3f