Analysis
-
max time kernel
135s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 23:57
Behavioral task
behavioral1
Sample
2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
2e49e2145abd430df98096330c2d08e9
-
SHA1
0e63a0a7a06d03aa33e28d32621912a00d555877
-
SHA256
fcc9d8542337b2a67c429b5d67ebfea4a1a90d0e730750236bef11cb6716e819
-
SHA512
1281fbe43b4ec4fe00e9d6479f520447ef6183f6ee1dae276934d07ef0371595e6ce550feaf9c187e61ba4ea825e465bffc1f6de3fa4299f1824b37259a93a01
-
SSDEEP
49152:xGlsTsguHRePyCwcakLz0AP5D+3tBGxcakLz0O:xGlystHRePy5cakcAPkdAcakcO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1632-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x00070000000232be-12.dat upx behavioral2/memory/372-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 11 pastebin.com -
Program crash 5 IoCs
pid pid_target Process procid_target 3660 372 WerFault.exe 84 5016 372 WerFault.exe 84 3684 372 WerFault.exe 84 3712 372 WerFault.exe 84 224 372 WerFault.exe 84 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3332 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1632 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1632 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 372 1632 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 84 PID 1632 wrote to memory of 372 1632 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 84 PID 1632 wrote to memory of 372 1632 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 84 PID 372 wrote to memory of 3332 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 86 PID 372 wrote to memory of 3332 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 86 PID 372 wrote to memory of 3332 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 86 PID 372 wrote to memory of 5048 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 88 PID 372 wrote to memory of 5048 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 88 PID 372 wrote to memory of 5048 372 2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe 88 PID 5048 wrote to memory of 4688 5048 cmd.exe 90 PID 5048 wrote to memory of 4688 5048 cmd.exe 90 PID 5048 wrote to memory of 4688 5048 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2e49e2145abd430df98096330c2d08e9_JaffaCakes118.exe" /TN n62KBHLda43e /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3332
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN n62KBHLda43e > C:\Users\Admin\AppData\Local\Temp\ubFSQEgcI.xml3⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN n62KBHLda43e4⤵PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 6083⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 6243⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 6323⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 6283⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 6323⤵
- Program crash
PID:224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 372 -ip 3721⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 372 -ip 3721⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 372 -ip 3721⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 372 -ip 3721⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 372 -ip 3721⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD577e895cd788fac11df22a7eaeffc43a1
SHA15f132a3c9a36081eda36967894e3ad991c085796
SHA256f41429d807cb179c575e3ef6891221894a59be717a26b480345b4a494acbdf1e
SHA512cf57f528b71077a7d7aa18f3b37a8dbbe512873836ff6a9d59b4329eaa6412a8b9d09af75e0f441692506768a904fbf25890ddf81c793841a79a2f9c8766e24f
-
Filesize
1KB
MD5713705673547d925efbc2e1f7fa0d691
SHA11fe34e24406eb47a590a8a93d63babd8c4905285
SHA2566540965ad39edc597e63122b9d840c153de4fc73547c3504e912e5f0d078ebde
SHA51261196cb6cfbe5635b202872e899c2f8b086e5b0f3c36f54a8ad09fd8a8e926fc37d98b86bfda70eebd06540ab359618b0ce111236993c09a746c9baf4a4ff3da