Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe
-
Size
385KB
-
MD5
ffbd28683aeffc81daf48c99ff57b78f
-
SHA1
1b0dfb8e4f4bb63d3d5343a4bc506919ab0c6f93
-
SHA256
68b4d7fe1d55cb0f03ce2a30bc591f827889b3db8c3019e2cdb4ea506842076d
-
SHA512
d82cd2f3328ad2caf43f8dcb1a48f8c6bfeb37d7a8b6b0b4bac4befcee370fe0cfda999ac0cd3340fb3d962966e618d07b48d493c80e18caf6fb724067eb3c7b
-
SSDEEP
12288:GvCaFvf+9LWKusC8wGqUF6pRZ2O77Aq0nlSwB:PaFvUusC8v6f4E7AJnlSwB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2600 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3812 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3812 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe 2600 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 2600 3812 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe 85 PID 3812 wrote to memory of 2600 3812 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe 85 PID 3812 wrote to memory of 2600 3812 ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ffbd28683aeffc81daf48c99ff57b78f_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD59e8e2225bcf8aafcdeeff9cf7f0384af
SHA16f6408fae2d0b05178e3d33e52c47b446d7856fe
SHA25617f95ca1fb1d003e46cbac77a53a15b5fbd81bf4a830563f634aefbd73df3e16
SHA5121c0b70a09031967370a67aa7a700b714bf96ca79f932482b4942b8e92c8c9b4c9286fa615f7715de4de1a8f7361a880bfe30a12a66d551152db3b3e18358673e