Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:24
Behavioral task
behavioral1
Sample
3759203736b142ce803638bc75207ef2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3759203736b142ce803638bc75207ef2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3759203736b142ce803638bc75207ef2_JaffaCakes118.exe
-
Size
7.8MB
-
MD5
3759203736b142ce803638bc75207ef2
-
SHA1
a86de2fdca17d24b5a73d8ed75bc983b17565e74
-
SHA256
ff7b9b2ef6e5eecb760e23ea502e4010c9e94d7c673ad5c5aa742160b455b24d
-
SHA512
57a792beaa70527c12250081c5114849685366b3cee84b569d55700a434117d5db201f30eb72e9534afa22b892df31a8c02b6e7bf36eebe0b7da47cb5d9649d5
-
SSDEEP
196608:TZf68zZ1NeQZ8zZB5d3xAzZ1NeQZ8zZ+jkgzkA+BzZ1NeQZ8zZB5d3xAzZ1NeQZw:Vf6ONeii30NeivwAENeii30Nei
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2996-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x0009000000023443-12.dat upx behavioral2/memory/2392-13-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 14 pastebin.com -
Program crash 16 IoCs
pid pid_target Process procid_target 3512 2392 WerFault.exe 86 2300 2392 WerFault.exe 86 2436 2392 WerFault.exe 86 232 2392 WerFault.exe 86 1064 2392 WerFault.exe 86 564 2392 WerFault.exe 86 1084 2392 WerFault.exe 86 1036 2392 WerFault.exe 86 2116 2392 WerFault.exe 86 3108 2392 WerFault.exe 86 2868 2392 WerFault.exe 86 2496 2392 WerFault.exe 86 2336 2392 WerFault.exe 86 4196 2392 WerFault.exe 86 944 2392 WerFault.exe 86 544 2392 WerFault.exe 86 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3672 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2996 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2996 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2392 2996 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 86 PID 2996 wrote to memory of 2392 2996 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 86 PID 2996 wrote to memory of 2392 2996 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 86 PID 2392 wrote to memory of 3672 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 88 PID 2392 wrote to memory of 3672 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 88 PID 2392 wrote to memory of 3672 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 88 PID 2392 wrote to memory of 3232 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 90 PID 2392 wrote to memory of 3232 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 90 PID 2392 wrote to memory of 3232 2392 3759203736b142ce803638bc75207ef2_JaffaCakes118.exe 90 PID 3232 wrote to memory of 3220 3232 cmd.exe 92 PID 3232 wrote to memory of 3220 3232 cmd.exe 92 PID 3232 wrote to memory of 3220 3232 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3759203736b142ce803638bc75207ef2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3759203736b142ce803638bc75207ef2_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3759203736b142ce803638bc75207ef2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3759203736b142ce803638bc75207ef2_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3759203736b142ce803638bc75207ef2_JaffaCakes118.exe" /TN SSr3lSGI950b /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3672
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN SSr3lSGI950b > C:\Users\Admin\AppData\Local\Temp\jCeCIZ.xml3⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN SSr3lSGI950b4⤵PID:3220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6163⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6363⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7163⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6443⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7403⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7803⤵
- Program crash
PID:564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 14563⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 15203⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 17323⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 16963⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 15283⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 17083⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 17323⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 17483⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 17603⤵
- Program crash
PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7123⤵
- Program crash
PID:544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2392 -ip 23921⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2392 -ip 23921⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2392 -ip 23921⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2392 -ip 23921⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2392 -ip 23921⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2392 -ip 23921⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2392 -ip 23921⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2392 -ip 23921⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2392 -ip 23921⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2392 -ip 23921⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2392 -ip 23921⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2392 -ip 23921⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2392 -ip 23921⤵PID:3332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2392 -ip 23921⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2392 -ip 23921⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2392 -ip 23921⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD54bdf70abd7229150ce80e324374bbd65
SHA1bf621dff764c732d7263a6a3fbaefd7223d520bb
SHA25623be02c1746ecb0e10d62282e17725eb44c6c83cca8a08b59b4893c8b3958b53
SHA51233488e49b6c308b8bb95c3e3bc5cef0da66da02992f720f678571bf12a8e527391ad5801237daa73fd3fc844d499064fe2bb7f58c9ab26840531d50d0048d7fc
-
Filesize
1KB
MD5213131474c8eb53bcd392f14276b1373
SHA102d93203af1b7e0a5fd69acf93e30e967138e930
SHA256cedcbb5f52e5a799fb1b204b20a84c0be6cdf9d2c753dfb858b76bd7c08b05a8
SHA512cff51b7c2bb07b05704b01c8a2572b20a31d977bfc6658dd9f56e406c5e10aa6e63f3313be3c2ddeb9d21465a3c31ea303958e5861b57b4323b8dd42ba40d807