Analysis

  • max time kernel
    157s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 19:34

General

  • Target

    0e31538ad66ac9efc1edfee7ede33c8a_JaffaCakes118.exe

  • Size

    404KB

  • MD5

    0e31538ad66ac9efc1edfee7ede33c8a

  • SHA1

    e43ea3ea60bfa64a76a8def7ba827706603e362e

  • SHA256

    5301125e4f73e020168ed7bc78641ad2d59e1766b10d04df6be1c3417bddea80

  • SHA512

    4181c7e3577ddf9b321b3e5fe21ca29741398d00cdfe8bc15e5448206dce6bcec1b7e8f47fe934f52f3aa527b82fdb326cf71556e57f5b75095cd8d2638ce257

  • SSDEEP

    6144:4jlYKRF/LReWAsUyjMf4QE8nu4XPTzzsB80lUqpdUTcBbk2IvAj++cVCW6fOg:4jauDReWFc4QXu4bsBrlJ3qAj+j6fJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e31538ad66ac9efc1edfee7ede33c8a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e31538ad66ac9efc1edfee7ede33c8a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\ProgramData\fqxhjt.exe
      "C:\ProgramData\fqxhjt.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2460
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3352 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DumpStack.log.tmp .exe

      Filesize

      404KB

      MD5

      482e6ded2c8e500460c9d2f6b7b991ff

      SHA1

      e5455347f6d7bbeb46cf753189cf89441ef16c51

      SHA256

      df0513598458d5bde7e2c7eeab2c93546c772f4ebd8dd6dd53c849dd10109531

      SHA512

      984be4d2596499fa6f4e02d5c81cdc7585ceb041aafa0c1745912b36ba1797326bd0289a5733dbb2ccbea72934ded5ff4cd062f5db8afa2160eaae657098c24d

    • C:\ProgramData\Saaaalamm\Mira.h

      Filesize

      136KB

      MD5

      cb4c442a26bb46671c638c794bf535af

      SHA1

      8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

      SHA256

      f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

      SHA512

      074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

    • C:\ProgramData\fqxhjt.exe

      Filesize

      267KB

      MD5

      1491150cf2371ed0d4341009928d12d3

      SHA1

      df90c7135b936dcd98962d6c9b82a9d56ed791b2

      SHA256

      3e015767cb2d8800680b8b1ab7246bcc6e9b82d79408996a124b297ec233f754

      SHA512

      e10b012aef66bb72d6ba4a84a5e8ceefdefe2093a9900aeb6c7a63ffbfebb35c55619d029d15924efc053e4df6d22c6f337476025aa4707aebfda528483ef5b1

    • memory/532-0-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/532-1-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/532-9-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2460-103-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB