Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 00:18

General

  • Target

    ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    ad2b65a082dd6d35b78f31c387a6463d

  • SHA1

    1e9e3aee17fa919f77d5683456272f06bb6b3afd

  • SHA256

    bec04840d5ea2fb9416c10af900d4b14fa2f5e59cf65fbb3945e7c8ba349dfb9

  • SHA512

    bdee1a1d0df25795de6677da2340960aa4109a53258adcaf955d0dee61bf08001efa9607fcecb953575ef29418fc7192a15a50d3feabd0c5b5274a45fda42e81

  • SSDEEP

    98304:Xn2ea7dRlYKcakVNGQV5caktQj/8qw+Hz0ucakVNGQV5cakD:Xn2bdR6Kd2V5dLD8dEdd2V5dM

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe" /TN 311UZRRNcb76 /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2728
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN 311UZRRNcb76 > C:\Users\Admin\AppData\Local\Temp\prk03J1.xml
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN 311UZRRNcb76
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\prk03J1.xml

    Filesize

    1KB

    MD5

    fc992913de1387931b1746bb49e948d4

    SHA1

    dc5161d08cf123f60dfbed8e16c83d18eb41ef66

    SHA256

    5146479c01115cc2c99f4ea1c22ab3ffc7fc90f62a668437a13d33663c7b2608

    SHA512

    5952ed46b223c312f915758e90fdf78b939654e82f481cf34db1cf88f9d685bd1c5905cefa328a361d90140d58adc1674f6a3074fa91b462fff57612b7f085cf

  • \Users\Admin\AppData\Local\Temp\ad2b65a082dd6d35b78f31c387a6463d_JaffaCakes118.exe

    Filesize

    3.1MB

    MD5

    79609ed8d6d8b515a69624ba059d168f

    SHA1

    22b1055f6abb18a8947fd079a64f67c3b7fd7f8e

    SHA256

    32785fe6bbddb6253f2b5f64ba97a2157d9c4ae04d43feea6964202c3373d80e

    SHA512

    b327ede89d85d2076fa559d5077328399769183a8df0746658b8f480a43c38552898ab9e5931e23e363c133b32b05921bdd1bedc7146557580558d0c02ded7e3

  • memory/1436-24-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1436-29-0x0000000000330000-0x00000000003AE000-memory.dmp

    Filesize

    504KB

  • memory/1436-30-0x0000000000470000-0x00000000004DB000-memory.dmp

    Filesize

    428KB

  • memory/1436-50-0x0000000000400000-0x000000000065C000-memory.dmp

    Filesize

    2.4MB

  • memory/2292-0-0x0000000000400000-0x000000000065C000-memory.dmp

    Filesize

    2.4MB

  • memory/2292-7-0x00000000002D0000-0x000000000034E000-memory.dmp

    Filesize

    504KB

  • memory/2292-1-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2292-16-0x0000000023500000-0x000000002375C000-memory.dmp

    Filesize

    2.4MB

  • memory/2292-15-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2292-38-0x0000000023500000-0x000000002375C000-memory.dmp

    Filesize

    2.4MB