Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 18:26

General

  • Target

    644b2432138080f8999caf663b388fa9_JaffaCakes118.exe

  • Size

    253KB

  • MD5

    644b2432138080f8999caf663b388fa9

  • SHA1

    eb1a22a9c2b5e522d8031e75032edee97be85b94

  • SHA256

    add66fae3979bf25c4da00c984f6f4efdd31ad7e46ed88be70593dfe364364fb

  • SHA512

    4b591053023557b577ce427338a1d15bebb9de1c4321fc8aea023e79430ce4503b71c931e575392eb678ce33625924430f7e275462bd95e4a0ca71fb32ddb524

  • SSDEEP

    6144:LhrPmDJFIMWa5gNlabWRF1UWsI72UT//OZQxevht:NLKIMWaqqKRF18CTLo/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\644b2432138080f8999caf663b388fa9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\644b2432138080f8999caf663b388fa9_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\deleteself.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\SysWOW64\attrib.exe
        attrib -h "C:\Users\Admin\AppData\Local\Temp\644b2432138080f8999caf663b388fa9_JaffaCakes118.exe"
        3⤵
        • Views/modifies file attributes
        PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\deleteself.bat

    Filesize

    358B

    MD5

    2c8407ad52acbff0537da078bfd00c14

    SHA1

    9d531bd833a55288c860831a2deefa23111e747b

    SHA256

    23fea3b52432733f62cf98fa4c6c116b1fb2e8710a1b0de39ea4de60a6431832

    SHA512

    1470fbb0c459209940ceed15bf7a312544e72c99c55f59eb14bfebd0612109814084ada4a2ca10b3ffc705d57c81626dfa4758e5475e4c4d0fad4b082869ed96

  • memory/2100-7-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-3-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-4-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-5-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-6-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/2100-0-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-8-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-9-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-10-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-11-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2100-1-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/2100-15-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB