Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 09:02

General

  • Target

    2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    2e5eedf6b183178ac17b4cffb96a1ad4

  • SHA1

    af0afc4674690bbe399df5ed0ea0d741b1edf449

  • SHA256

    b2346c24bc6245b1cc076dee6ee8fd6f0dc055d97b3660d859eb2f532318e240

  • SHA512

    8104e4f55ebc9dd83530172273be674066bf4d22560cef2240fd0be26214d607a76a730107a2dc04b97cb8ee0f113b5793643e61f230cd474fb464aadbf108e8

  • SSDEEP

    24576:FqshhgkVwIISYeTL1Q0jc3TP0ejf5eQCMnMvLHNX1sxuggvG:FfhgkebSYenfWMsm/hFI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\2e5eedf6b183178ac17b4cffb96a1ad4_JaffaCakes118.exe

          Filesize

          1.3MB

          MD5

          1a0f2751bf00c76dba5d800ce12440f6

          SHA1

          f8642b086361c283d0c4401473bafa219147deba

          SHA256

          2fa498f41f88b12232a33040942a9bd392d37777a99058b7a86a3cba227a5222

          SHA512

          54a25c95426198e7b7114d364bf93a01ce05793b5a2462befb0ac578f912564391d8cba89bd49d14433286f4afd14f1abb2fe40d592bf584edad1ab2ab7a18d7

        • memory/2712-4-0x0000000000400000-0x000000000086A000-memory.dmp

          Filesize

          4.4MB

        • memory/2712-0-0x0000000000400000-0x00000000005F2000-memory.dmp

          Filesize

          1.9MB

        • memory/2712-8-0x0000000001A60000-0x0000000001B72000-memory.dmp

          Filesize

          1.1MB

        • memory/2712-16-0x00000000034F0000-0x000000000395A000-memory.dmp

          Filesize

          4.4MB

        • memory/2712-14-0x0000000000400000-0x00000000005F2000-memory.dmp

          Filesize

          1.9MB

        • memory/2764-17-0x0000000000400000-0x000000000086A000-memory.dmp

          Filesize

          4.4MB

        • memory/2764-18-0x0000000001A60000-0x0000000001B72000-memory.dmp

          Filesize

          1.1MB

        • memory/2764-19-0x0000000000400000-0x00000000005F2000-memory.dmp

          Filesize

          1.9MB

        • memory/2764-41-0x0000000000400000-0x000000000086A000-memory.dmp

          Filesize

          4.4MB