Analysis

  • max time kernel
    92s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 07:29

General

  • Target

    864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe

  • Size

    479KB

  • MD5

    864c6461a405628b69fb52e1cad9d845

  • SHA1

    bd92998beb96c5bbc013326b4e9f97aa71b0da07

  • SHA256

    33b266ec8faff2cef0a77d1c0ea818608764a2c2c0d8350911d50ab8266ab9dc

  • SHA512

    927cc76cb6c9d525e540ea3aec0606020dbf8bea309bd08cdf29adfc49a7e0c1043eb9dadef596b537b0322e37c395cf75433967e952a20d76d3683885c3bedf

  • SSDEEP

    12288:ysOZAy3/0P5tMqm3aCc+MWSk8xewTFSNgMliFl:Pyp/E5tMKCc+Mvk8xeWFSN3il

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe"
      2⤵
        PID:1964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 1020
        2⤵
        • Program crash
        PID:1200
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3476 -ip 3476
      1⤵
        PID:1808

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsi3559.tmp\olldmhffoaz.dll

        Filesize

        22KB

        MD5

        374e00e1b931d7e06c74d4ce9c9476a3

        SHA1

        5f199903f9b64b10e218b4d98621f7c2b02b11d9

        SHA256

        80f175c88444e4c1388bdc3560f9c44b9fb3a24861f20bbedab4b5dfd69d10ef

        SHA512

        470793bc592c7ec78cc1dec91ebe48d6136c60d179512782b8b41532d372a8293c53913653931b3c74d1544fb038e1fc649cac745bd65310c1ffc88606350ad4

      • memory/3476-5-0x0000000010000000-0x0000000010009000-memory.dmp

        Filesize

        36KB

      • memory/3476-9-0x0000000010000000-0x0000000010009000-memory.dmp

        Filesize

        36KB