Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-04-2024 18:35

General

  • Target

    bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe

  • Size

    285KB

  • MD5

    bfb7634d04e19d55bdffee5ff3f3bda0

  • SHA1

    e6b702c3eacb93d3e6615f41b3440b44c57bd63e

  • SHA256

    3d58d111ae5a63495a3c74a063b30011a25b828b417ae9a4373f3fd0d55d5925

  • SHA512

    3d309b496eecc1bda9fae766fee2f3ee6d183bda9821ed2b0b97372933d019f58a9a12e3b030bd6cbb1d15803098b44d5e153817aee08630767040a514d13d57

  • SSDEEP

    6144:T1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe/ZVMXTw:TjkArEN249AyE/rbaMct4bO2/n

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files\Managemenot\Monitor\tcpscrex.exe
      "C:\Program Files\Managemenot\Monitor\tcpscrex.exe" 0.0.0.0
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Managemenot\Monitor\tcpscrex.exe

    Filesize

    285KB

    MD5

    92054a1bdb7be49ed11c5a3987e80135

    SHA1

    0c1921966d89285a691069c2ca9d98646c2dc1e9

    SHA256

    19893b4881325485faf2f2f61ce66976a78d06e20ba6352c26fa206d7b030d17

    SHA512

    a22c5b6733cbbd086e4b1a36ee3c23e5e5c105bdb2389bf89cd843ff0ebf2e4df36413682391a7e6041b025bce2c9ba7c3a60e0bc82e1492c0009f3550d2e46f

  • memory/2096-21-0x00000000049E0000-0x0000000004A94000-memory.dmp

    Filesize

    720KB

  • memory/2096-1-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2096-11-0x00000000049E0000-0x0000000004A94000-memory.dmp

    Filesize

    720KB

  • memory/2096-22-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2096-0-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-28-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-27-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-24-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-29-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-30-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-31-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-32-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-33-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-34-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-35-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2620-36-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB