Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 01:23

General

  • Target

    2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe

  • Size

    27KB

  • MD5

    2a7d2befb03145a9837f4827d05db1ed

  • SHA1

    d4464ec3c4057c737310ca7f2b2a089102d231e4

  • SHA256

    5223364bcd9f0400157bfc50971245d1aeff93f6e83680918544e6a74b060cef

  • SHA512

    198475c4a2c060165c3b37237ffa126e97f0bc06c3886492bd4e431b929799957d84c4ef33f8fa1146a7b316d67f034cb3486ff01b8e465b32017ca6f30db99b

  • SSDEEP

    768:edi0A1Gy05vCPVSrTRuVheaA8S0Uux/N86UUs:epAED5E4TRu/ef8S6x/7U

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\gmonufswr.bat
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\beufdl.bat

          Filesize

          131B

          MD5

          d06c3ed72beff5649223c882c7b9b341

          SHA1

          d8fa562b34bdd5516a0f2cbd061eab1ea0a9252f

          SHA256

          94896f8206c83d76727dba50402f8246b3db9214d7db1ecf7843f0c63d65befb

          SHA512

          68fe35bb772e3165ad608d89d79c48073d87942d3b93c293561da31b41b93cd4e0decbac72f67401a448203d122228c6eea77ec4c14a8c09eb963b01da243c5a

        • C:\Windows\SysWOW64\gmonufswr.bat

          Filesize

          100B

          MD5

          b88a83b9a6e23b0c69720dba9eb367db

          SHA1

          393cb1e55d16563facb5e11da7c773681ef882bf

          SHA256

          391b2b47fbe9cb5d2a5f352735f9743732de9778a593f0a73eff7dd4969bd567

          SHA512

          c4a4b9dfed28b5fadc4666f31285260663f5d05114f9d8d4005a67b78ca532d8a25be1863667a1a7da70de599d46aad02c454f5238007645b0c0630dcd79bebf

        • memory/2280-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2280-9-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB