Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 11:17

General

  • Target

    e9de1b9b0f4881787cb73a4136fff24d_JaffaCakes118.exe

  • Size

    103KB

  • MD5

    e9de1b9b0f4881787cb73a4136fff24d

  • SHA1

    cc1e00996090f15c092e4e4f6c82b9aa7e0d0c38

  • SHA256

    7863fd1ced51124a1a30a66e527bc2cbb24063173d0c51f62c9a856eb12423d9

  • SHA512

    5b28db105d2ca8fdb72e7fbec8a645738c3d78625e103f60682f42cfea91fc1676361de849494520fe768d988dc1ea54f5f3421ddeae59dde40e5ae1132f3d06

  • SSDEEP

    1536:DPgy6TWEyq+kzZMuerK/JOfWh+CkMeJwzuRAjOpJuVxWmZqA:DP5xBqXGZqJc52CvpEVxWmZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9de1b9b0f4881787cb73a4136fff24d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9de1b9b0f4881787cb73a4136fff24d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qjp..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Qjp..bat

          Filesize

          238B

          MD5

          c7c4208a8a61ee5dbbf32c713fc176f7

          SHA1

          f949e97e5318fc5224ba21e5e03aa3c94acb3212

          SHA256

          15faff78fc0664af9cc0c4a3ad875a0e3e7f159a6d86dc2bb93e0f50202aaf95

          SHA512

          3d0103beada987b3434584d6528b5bda8d890f3121f3a0433d84d5a1e6a6e02a2766eb628b44ef87868a60747fc0ff83d45ee8b25a80c1c699b1eed533ecd800

        • memory/2196-4-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2196-2-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2196-1-0x0000000000120000-0x000000000012A000-memory.dmp

          Filesize

          40KB

        • memory/2196-0-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB