Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe
-
Size
385KB
-
MD5
fd49a9d34c3c4a331634d522c43d823b
-
SHA1
7851fbe5133c8db94c6a15aefe2db45ff0eb1151
-
SHA256
b6b6d0bca3f8e8f360eef0a3eb3368a61a94a9534a5bfec589b4d12a0b2d62d0
-
SHA512
c6f6a1439f0342e5b423feb0b6670451407c86b1399b4a50ecc5d6119ccfe83492b78052e84c5a41c26696319943c7faae34e4c8c934d2d7438a21e26e07e2a0
-
SSDEEP
6144:7JDBDfqcEB1AjzthP0Fkcf8VC82SZT5jVNfv1D0zi2yzGB:11epAzYe1t2SZT5jVhvki2lB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe 2344 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2344 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2344 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2344 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2344 2860 fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fd49a9d34c3c4a331634d522c43d823b_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b07556311afa454876dc825c6940b970
SHA1f14a7c3f35d2528d60c7c111d41ee66668536ca0
SHA25674c8b36f95b6763be8cab7f59270bc85a2a783bc500b96a3d4a4f6e2c5faa25d
SHA512ececec8de019918c1c915c4bda0247bda140bdaa81f1963988c2a2ffcd3b8001b0f132833154efeee902200cb3f877d656f45c49aa9510974e9f0f6ef7698872