Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-04-2024 03:28

General

  • Target

    666f900d4bea7aed217c97cc75f756e4_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    666f900d4bea7aed217c97cc75f756e4

  • SHA1

    15e5c180b82500513bb1b63d606bc9c1f3e0a84f

  • SHA256

    467d311a5b7aca52e3d2a2399928ae1ff2d20b26a5f131499a6dd3a7b28880a6

  • SHA512

    3a221fc25dedd9e6a3fcea535e6ed4ff70ab29c5070f468a27281aebf4d4f0623fead81384597677b21daf53f0dd1b472bec0572c5f2141abe86cb6f00bef6e1

  • SSDEEP

    768:lIv/MicLIULFMBc237bobA7ymRd0uxUDTJL6oNsgBvAyox0cUg:luCLIULFMAAiu6JL6oNsgFAyox0cUg

Malware Config

Extracted

Family

purecrypter

C2

https://store2.gofile.io/download/8f4b715b-b774-4bce-b2ed-2b0e811119e8/Wsyytcpdwievapelubhdra.dll

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\666f900d4bea7aed217c97cc75f756e4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\666f900d4bea7aed217c97cc75f756e4_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1552
      2⤵
      • Program crash
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1136-0-0x00000000000E0000-0x00000000000F8000-memory.dmp

    Filesize

    96KB

  • memory/1136-1-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/1136-2-0x0000000000530000-0x0000000000570000-memory.dmp

    Filesize

    256KB

  • memory/1136-3-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/1136-4-0x0000000000530000-0x0000000000570000-memory.dmp

    Filesize

    256KB