Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 00:50

General

  • Target

    7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe

  • Size

    2.9MB

  • MD5

    7b49c85f43dd4586209075ac6bbf15da

  • SHA1

    7ec72f060b7d13e23fa4e212a9b3a5d8dde836b8

  • SHA256

    94e00053190f06f1b1b3ad2f148d8bc3a2765f5b91784bd2b7d92d1c82facca9

  • SHA512

    207aa7ea91133bc6201abe9d9d345225cad3580cb28af47528bdc2591db19a8feed0db64e9c2d50f34909f68b39b0bf9efef7342af5f193c884d702e655c0376

  • SSDEEP

    49152:0YjSnqGFfkHlcViu+Pj9sCR2Xm2AUM6OS0N74NH5HUyNRcUsCVOzetdZJ:0YjSnqG6HlcViRZxCj64HBUCczzM3

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7b49c85f43dd4586209075ac6bbf15da_JaffaCakes118.exe

    Filesize

    2.9MB

    MD5

    4ea27222216e6bd4737f8d325a06ca89

    SHA1

    e640a08e306d83d430a9e8d0ec8b78040808da1e

    SHA256

    6e9d21e33107e6d4aa6db3aad174087d25ed26d899ae7790e72cbd96264013b8

    SHA512

    b29c6c016ee160f4fce36f6dcddc2779f6157e41c35bbfcd9324bcc5375334e503546ffe9b6909e382fbe1ac11228c51d874d4d851da651b7bae60599eb070a4

  • memory/2192-12-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/2192-14-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/2192-19-0x0000000001D20000-0x0000000001E53000-memory.dmp

    Filesize

    1.2MB

  • memory/2192-20-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2192-26-0x0000000005620000-0x000000000584A000-memory.dmp

    Filesize

    2.2MB

  • memory/2192-33-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/4912-0-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/4912-1-0x0000000001CB0000-0x0000000001DE3000-memory.dmp

    Filesize

    1.2MB

  • memory/4912-2-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/4912-13-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB