Analysis

  • max time kernel
    93s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 01:23

General

  • Target

    2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe

  • Size

    27KB

  • MD5

    2a7d2befb03145a9837f4827d05db1ed

  • SHA1

    d4464ec3c4057c737310ca7f2b2a089102d231e4

  • SHA256

    5223364bcd9f0400157bfc50971245d1aeff93f6e83680918544e6a74b060cef

  • SHA512

    198475c4a2c060165c3b37237ffa126e97f0bc06c3886492bd4e431b929799957d84c4ef33f8fa1146a7b316d67f034cb3486ff01b8e465b32017ca6f30db99b

  • SSDEEP

    768:edi0A1Gy05vCPVSrTRuVheaA8S0Uux/N86UUs:epAED5E4TRu/ef8S6x/7U

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\mvzrnduba.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\gpfmqq.bat

          Filesize

          131B

          MD5

          d06c3ed72beff5649223c882c7b9b341

          SHA1

          d8fa562b34bdd5516a0f2cbd061eab1ea0a9252f

          SHA256

          94896f8206c83d76727dba50402f8246b3db9214d7db1ecf7843f0c63d65befb

          SHA512

          68fe35bb772e3165ad608d89d79c48073d87942d3b93c293561da31b41b93cd4e0decbac72f67401a448203d122228c6eea77ec4c14a8c09eb963b01da243c5a

        • C:\Windows\SysWOW64\mvzrnduba.bat

          Filesize

          100B

          MD5

          26e6ad4bac8f8b5b0453f9b59c04c532

          SHA1

          535c1031003df650c26d16e3489d36d2349c2a7c

          SHA256

          d68c133ea8a0aaec0e221abef7a3956cf37369eb8a369ba73e0696ef68da3fec

          SHA512

          3669a2fff7a30e1f386f7939407895c1da78c3351d423df657837ce1e7239cf728066441dae0061286f9c2c6447557abeebece40394d382c13799938a7610135

        • memory/3896-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3896-4-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB