Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 08:55

General

  • Target

    e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe

  • Size

    334KB

  • MD5

    e99eec24eda1a60927fe3571cf809231

  • SHA1

    b59e00498a3dba6ca160bc64df8b456832ccc7a7

  • SHA256

    650d72343156a5a8d13cb47d3c018aae3dabd18aca278407b280069c56c59aa3

  • SHA512

    e459fe2594d8e7ae284bb00079d444b58426fcaa22ac79437d22deeb2def0743e758c35b04c66fb8488c2231c76ecc39671c801198519a6426bb6d93135d7332

  • SSDEEP

    6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kII4V41:QjkArEN249AyE/rbaMct4bO2/V/C1

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          C:\Users\Admin\AppData\Local\Temp/server.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Users\Admin\AppData\Local\Temp\server.exe
            {:\Users\Admin\AppData\Local\Temp/server.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      39KB

      MD5

      2f78d097e2e9b8ac9fab35f453134409

      SHA1

      bd4cbc1e25ba2331164f08d5c82df01b29461da2

      SHA256

      b910c2f8fff06e095df084b36edbad509eb6437c40100c05d61282979b7b371c

      SHA512

      7b31d55da2b611c28b0e1a8ce11df69d51d5edbc45837de19fc0e924a989bf1dbc1c986f8517709aaef28a422dda0837f31b7b6431ae77e6530b29280a269900

    • memory/1092-28-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1092-32-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/2208-17-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2208-19-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2208-21-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2208-23-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2208-26-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2208-27-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2208-30-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2208-41-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2824-0-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2824-14-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB