Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 13:03

General

  • Target

    ff56709f208529baa7cdf3aa52955d1f_JaffaCakes118.exe

  • Size

    907KB

  • MD5

    ff56709f208529baa7cdf3aa52955d1f

  • SHA1

    5450b34d08a0e75c9f966428bbc4eded207d8d63

  • SHA256

    b8b7b5d1796d588faaeb2355e0e86fc728c905306268738106d421a2e76da5bf

  • SHA512

    fce876183cdc4d850be3e0d9b30df36de60694746bda16dae4cfd0dedca87a4dc57770ccf651d8fa6e151e09628beadcbec71b4b5c34ac066e55402740b29bda

  • SSDEEP

    24576:SjWoMTyQXCHW9cNe8X08Lv4rSN+P75OW3A6tn4Ya/ZS1:Sy5yVPE80rSNuvnFgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff56709f208529baa7cdf3aa52955d1f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff56709f208529baa7cdf3aa52955d1f_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\ff56709f208529baa7cdf3aa52955d1f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ff56709f208529baa7cdf3aa52955d1f_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ff56709f208529baa7cdf3aa52955d1f_JaffaCakes118.exe

    Filesize

    907KB

    MD5

    f6671b3718e06d679870fa74f8fb2df8

    SHA1

    9d1ee07c9ba40f870b4f3ff9be4cd00ccc56d37e

    SHA256

    7bf37037a36ba48884571358028b39a3b87ff142bec2987253db80ca151745bb

    SHA512

    71fa656a6221b7a3b5193c0f9826b26e34b3dfc127f48b9e36d5e928a7b71ceca71e97e4bd5e8357af15f7a99c3f9d02b7a711199910664d899aa946aa680c75

  • memory/372-13-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/372-15-0x00000000015B0000-0x0000000001698000-memory.dmp

    Filesize

    928KB

  • memory/372-22-0x0000000005090000-0x000000000514B000-memory.dmp

    Filesize

    748KB

  • memory/372-20-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/372-33-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/372-39-0x000000000BA30000-0x000000000BAC8000-memory.dmp

    Filesize

    608KB

  • memory/1608-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1608-1-0x0000000001780000-0x0000000001868000-memory.dmp

    Filesize

    928KB

  • memory/1608-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/1608-11-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB