Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2024, 23:35

General

  • Target

    754ba26e13a3d15d6197d979a844f023_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    754ba26e13a3d15d6197d979a844f023

  • SHA1

    cac4e18460aef24994519ca703eadee36e474d34

  • SHA256

    8e95066942b988b06903b43a8c2c3ce15678b534721c9e2cdd344f040f734ee8

  • SHA512

    8f3928d6f1d95930ed1c9fc9bd7672788de390f18a68ffe7d7a2788e0bdf62eca20ff04f5ac29f0264819af6c50b9c4cfe9ece49f58a2bd2e10cc5e677e13b3f

  • SSDEEP

    49152:bCd/n9/SFcWDUiTj3IlB8w6P4M338dB2IBlGuuDVUsdxxjr:bCp9/NB8w6gg3gnl/IVUs1jr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\754ba26e13a3d15d6197d979a844f023_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\754ba26e13a3d15d6197d979a844f023_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\754ba26e13a3d15d6197d979a844f023_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\754ba26e13a3d15d6197d979a844f023_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\754ba26e13a3d15d6197d979a844f023_JaffaCakes118.exe

    Filesize

    2.4MB

    MD5

    019cc8a357db84030e8042365a19fa19

    SHA1

    c2540a78b79c0e61cdcbc860930077dee5068d3d

    SHA256

    9ead55f958a552c6ad3abee1dd94d764bff9f6444a10da9b0f2f41aaa47316de

    SHA512

    ce913607d78a209c1ba5ef829e664e652cff01b3ff7462a94d22bbbef71b17cb76756f56b229d2343a9810f5e204f3c55abf4d6788784f7a5ca240165067475a

  • memory/2196-0-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/2196-3-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/2196-6-0x0000000000270000-0x00000000003A3000-memory.dmp

    Filesize

    1.2MB

  • memory/2196-13-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/2828-15-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/2828-21-0x0000000001B20000-0x0000000001C53000-memory.dmp

    Filesize

    1.2MB

  • memory/2828-16-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/2828-22-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2828-28-0x0000000003410000-0x000000000363A000-memory.dmp

    Filesize

    2.2MB

  • memory/2828-45-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB