Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 18:30

General

  • Target

    0ce98910be0fd7271444f04fb92ece8f_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    0ce98910be0fd7271444f04fb92ece8f

  • SHA1

    fac1663749b336489f50a8206bb2c81835f6450e

  • SHA256

    48f5931c51df86fc67695db2e54694fbe1631e5ea27ff5b47cb381ec34ac7344

  • SHA512

    ccec3f0ad6ed91fc662ff9de6ff947cedd214121ff82c1e6ad67d341e79042303e119f4b208ff969ccb7288b6f676ffc0402246eb4530e4ef05f4ffe42e7ed50

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYlPgt:hDXWipuE+K3/SSHgxml4t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ce98910be0fd7271444f04fb92ece8f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ce98910be0fd7271444f04fb92ece8f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\DEM1056.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM1056.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\DEM65E4.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM65E4.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Local\Temp\DEMBB53.exe
          "C:\Users\Admin\AppData\Local\Temp\DEMBB53.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Users\Admin\AppData\Local\Temp\DEM10D2.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM10D2.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Users\Admin\AppData\Local\Temp\DEM6690.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM6690.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1440
              • C:\Users\Admin\AppData\Local\Temp\DEMBC1E.exe
                "C:\Users\Admin\AppData\Local\Temp\DEMBC1E.exe"
                7⤵
                • Executes dropped EXE
                PID:2408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DEM10D2.exe

          Filesize

          15KB

          MD5

          35f6190204cee5fc58aec392f10687fc

          SHA1

          8123efca8542f516acbd535ea0fe092a1d0dd518

          SHA256

          da797cd10649c91f23311d413d230fc84de603bda8c8f0c14098276194530432

          SHA512

          e695afe9a57076feb00743303217524a6ac499c3db0ccf893a2dce9b0464d4fb7f8e5fc739c1a6e44a8240fe1870b69da93a8b43fb5f26662e183a7bee10121c

        • C:\Users\Admin\AppData\Local\Temp\DEM65E4.exe

          Filesize

          15KB

          MD5

          2f9b1216da1ca59bac0a216f91ffce8c

          SHA1

          1c02b2ab05a05eaaf9a2cae2b5c451313ebf14c4

          SHA256

          d612669cb288a650f5c5028ab230d5ae3c8413a7f3b94285b4b10e11eab651a9

          SHA512

          18b486f67fcfd5c370f674f624f4072fd170b6894f964b10a33356f28279332a7e5bb9c97b2832f8d95f9d388b7b4e9b1a164e0b2b8e6e1be4cda18d3018f20a

        • \Users\Admin\AppData\Local\Temp\DEM1056.exe

          Filesize

          15KB

          MD5

          866a8c73c06ef03429f77d3f11251b0b

          SHA1

          12954e8207667b4d685c8a66dd300473c86c584e

          SHA256

          e1935df486f72eb6000e008359041fcc7194104ee828f9e4cf3ec7f2e30949cc

          SHA512

          a23f2f7e38da9d8eb9d433c00ee967e97781af00706ba6cf540b0cf543e2adbe740da487ab2f210d1382e65b6a6fa7cbae08d40170f94d4ce1c0ff30bd0190b0

        • \Users\Admin\AppData\Local\Temp\DEM6690.exe

          Filesize

          15KB

          MD5

          803468dc59c713e2dc10c0a878673e69

          SHA1

          f1768e29f674a1b4de5720f9561dba28a52ed13e

          SHA256

          f926a1e6e56f3caa56777252ba8cb9a3dfe5c7f9501523dcfeb8f35eb9b6f167

          SHA512

          aa224d715cc8ebdadbc4ee125a71ed975dbbe3c926e8aa551c28333c9033fcfd9e2c139c6f025840b2da4297ca074b01d9e4896c4dbc91eab37d5b1a7e78fe35

        • \Users\Admin\AppData\Local\Temp\DEMBB53.exe

          Filesize

          15KB

          MD5

          4d320794c150422a73d7a478f9847e3f

          SHA1

          657530eac132ed21d4acf2314c22e0b2ff1d8c60

          SHA256

          a1ead2f4969b92be18a385d0062325b56bc5e42beff8d8b71f976debf3283a68

          SHA512

          53057fe6faf875c6773656b45fa7cecd281d0f647d61660052b474633187d257bae76f5435177865bee5679086ca087353b4d2a50ad4148561e5de7b70789459

        • \Users\Admin\AppData\Local\Temp\DEMBC1E.exe

          Filesize

          15KB

          MD5

          fc8e18d5322706c26d586d9bafbb0144

          SHA1

          cde22a12adee15709d7255436f54c9fd50538c77

          SHA256

          9657e73f40bfac9c584b396840028f35a1b0c15ef94b5f87012ea9212b53932c

          SHA512

          003c9d3a37184cf75ae7b23201cd1cde7a838a29313576a3a15d1c59f477333e0fd2aa367a15ec9fec47893c8ac69b2a8c585336a482abca38a950fe4bb9897f