Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2024 00:50

General

  • Target

    7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe

  • Size

    2.9MB

  • MD5

    7b49c85f43dd4586209075ac6bbf15da

  • SHA1

    7ec72f060b7d13e23fa4e212a9b3a5d8dde836b8

  • SHA256

    94e00053190f06f1b1b3ad2f148d8bc3a2765f5b91784bd2b7d92d1c82facca9

  • SHA512

    207aa7ea91133bc6201abe9d9d345225cad3580cb28af47528bdc2591db19a8feed0db64e9c2d50f34909f68b39b0bf9efef7342af5f193c884d702e655c0376

  • SSDEEP

    49152:0YjSnqGFfkHlcViu+Pj9sCR2Xm2AUM6OS0N74NH5HUyNRcUsCVOzetdZJ:0YjSnqG6HlcViRZxCj64HBUCczzM3

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe

    Filesize

    2.9MB

    MD5

    899561e18065004c4d0860150c4af322

    SHA1

    fe50ff6e0e4bdf28139d62e56e6e6e09c1302329

    SHA256

    b529547a462b076c374ef32f89dda17c7fc0e1a0f509f0113a8a219d71a91b21

    SHA512

    898ef909b380839fece65190492df6e8118aefa0c8122a813ddecfa008877dd2bb1014a28ca57fe0fa5ac6dee0ab678d3eddf10ba261f625804113f817748479

  • memory/776-0-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/776-1-0x0000000001B20000-0x0000000001C53000-memory.dmp

    Filesize

    1.2MB

  • memory/776-2-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/776-14-0x00000000037F0000-0x0000000003CDF000-memory.dmp

    Filesize

    4.9MB

  • memory/776-13-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/2152-17-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/2152-29-0x00000000035A0000-0x00000000037CA000-memory.dmp

    Filesize

    2.2MB

  • memory/2152-28-0x0000000000130000-0x0000000000263000-memory.dmp

    Filesize

    1.2MB

  • memory/2152-22-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2152-16-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/2152-46-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB