Analysis

  • max time kernel
    155s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 16:26

General

  • Target

    ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe

  • Size

    8.6MB

  • MD5

    ea6a4d1280bdfbbee4d15668ae50781a

  • SHA1

    23c494fc8e7e010c80f34973eac1f57c94ff6760

  • SHA256

    757231d21461949d1c6d6127d98f0be2f786f5d30a93bfdc18ec9c9ab9a91c7b

  • SHA512

    89360b24f56735bb69d53d8f9a33459be73b1de4ae1c51272986dfe9ef839bfdcb1fdd9c8f4b9436415ba289015935dc7f42c65161bfa6fdf4854f048deb4741

  • SSDEEP

    196608:+hkw/Zs+XYpGyYMSjvf2JbGeNmslKJyBBEEE++CmZYOo+EEEEEEEBBBBBBmmmmmO:+nPXYpGyYMSjvf2JbGeNmwKgBBEEE++K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k C:\tuto.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\tuto.exe
        C:\tuto.exe
        3⤵
        • Executes dropped EXE
        PID:2832
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2228 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\tuto.exe

      Filesize

      14KB

      MD5

      251b9e5ea854eca172eb5a1ea480c718

      SHA1

      f2d3a641f762ebafce3fe60ba1bf764cd2a6bbec

      SHA256

      4ea747bcd91bc5fc5025b7eb4d4cbba6672a00361285550cb4ca55ad57c95337

      SHA512

      a850de833b3744d31ded0e72549b16614cea9f66a2c989505914de4600c4ffcde842a658d629e0980586cb2c424c3c946e148051a6c82f6ae987da8202d0f8bd

    • memory/2832-8-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4032-0-0x0000000002A40000-0x0000000002A41000-memory.dmp

      Filesize

      4KB

    • memory/4032-3-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-9-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-11-0x0000000002A40000-0x0000000002A41000-memory.dmp

      Filesize

      4KB

    • memory/4032-12-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-13-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-15-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-16-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-18-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB

    • memory/4032-23-0x0000000000400000-0x0000000000CA6000-memory.dmp

      Filesize

      8.6MB