Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe
-
Size
385KB
-
MD5
ff5458c2f3605cf029b08c4da721ca3c
-
SHA1
06e8ec491dd245257d1642cd3d19c9526446feb9
-
SHA256
78dcf46d4dc022b68771ede8fe1f7a711b0fd7635121625a00833ed02987eb6e
-
SHA512
5f443324f4c57ed031de34fb1093833e690b407ebc446c8df99bb54fb89b2584098c0f9e21b3e0d3a16dbb4010f52f9a256367e41ed87a9f6c9b4f3f1c9d31d4
-
SSDEEP
6144:UjZol9H2iglohoj7RUNXz203utRZk1QHQkjjdVHLWWfKX88CQ/e7wB:uil9HuV7RUNX7YRZYQHjj5VHaCQ27wB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 812 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 812 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4836 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4836 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe 812 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 812 4836 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe 85 PID 4836 wrote to memory of 812 4836 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe 85 PID 4836 wrote to memory of 812 4836 ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ff5458c2f3605cf029b08c4da721ca3c_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD505c0037295823fc7c957a676edbee06b
SHA1a929c001fb1c163545fadaffde6e5b721131e39f
SHA25689243e1da766c87a9fed386ee6b54467475a988ef193ccf2731d536b0e19fcd6
SHA512c10e02a194c070ae9a4e867fa8fb10a604122f257e5d2e6531632df62cddfe871dfd67e12c1b66d3430af9aa0f9519ef76be975dbb8e3bb55ed19d654147ed9c