Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 21:33

General

  • Target

    ec09f285a2e134a75a9c39832cae6caa_JaffaCakes118.exe

  • Size

    182KB

  • MD5

    ec09f285a2e134a75a9c39832cae6caa

  • SHA1

    6267f73f13ddfc96684f440934873e7dfb3aab26

  • SHA256

    77fcdb927eb46ea4226b92a7a5e78577ae65d11e37b4a3e37d7cd3545daab57f

  • SHA512

    a262fb7c5cbf5c91e37f8e6ed10565b656e5f17f057295b7f7604a6b11961253997700b682cdc2cf2a8ec0ba3597d458dbf4cc7dd47a89416d3ef7b6596fbd10

  • SSDEEP

    3072:cVi/IbhPRQaEjDuCy0iL0F0OJDcYZ+MAFwzYRw3s3lB7USot5+Li:0sQEN1iQwM2wz+SsVB7Vu

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec09f285a2e134a75a9c39832cae6caa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec09f285a2e134a75a9c39832cae6caa_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4820
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4592

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Instant Access\DesktopIcons\NoCreditCard.lnk

      Filesize

      2KB

      MD5

      01699e298d5ef044eda2e30b4cebb234

      SHA1

      e6bcf8965c3fdce87d4edab3ab50b5f4dd4de99a

      SHA256

      7903c9a2bb5e61af92f861e722d5158246b30a46f26d1069b4136fba3c78335e

      SHA512

      52eb39dc907e963943782c0d6b4e438a6a38ec5c1deacdd1d2b032c6bc75916d5105cac6fc258d34c1b0fa7548d93b8a7ffe6f17c00916ec7aa501a316724ea7

    • C:\Program Files (x86)\Instant Access\Multi\20100919060923\instant access.exe

      Filesize

      182KB

      MD5

      ec09f285a2e134a75a9c39832cae6caa

      SHA1

      6267f73f13ddfc96684f440934873e7dfb3aab26

      SHA256

      77fcdb927eb46ea4226b92a7a5e78577ae65d11e37b4a3e37d7cd3545daab57f

      SHA512

      a262fb7c5cbf5c91e37f8e6ed10565b656e5f17f057295b7f7604a6b11961253997700b682cdc2cf2a8ec0ba3597d458dbf4cc7dd47a89416d3ef7b6596fbd10

    • C:\Windows\dialerexe.ini

      Filesize

      695B

      MD5

      1e95259ce59e1c86072efe133188b3e2

      SHA1

      86a9de29d7e941d8f208d07cae933dd168e45151

      SHA256

      efa5e669b0053a783f9919232ef189802d3944dabd37e213689ccaa76d7ef799

      SHA512

      6652791a00052be4b0e1b4d60a3c395f233372a5cb67c96d145504c7e4b1b586c81f0d338eb7cfe5529b312cb65e82e57c6fb850e07d893fe2e328efe5feda4b

    • memory/4820-0-0x0000000000400000-0x0000000000445908-memory.dmp

      Filesize

      278KB

    • memory/4820-1-0x0000000010000000-0x000000001004B000-memory.dmp

      Filesize

      300KB

    • memory/4820-3-0x0000000010000000-0x000000001004B000-memory.dmp

      Filesize

      300KB

    • memory/4820-4-0x0000000010000000-0x000000001004B000-memory.dmp

      Filesize

      300KB

    • memory/4820-5-0x0000000010000000-0x000000001004B000-memory.dmp

      Filesize

      300KB

    • memory/4820-12-0x0000000010000000-0x000000001004B000-memory.dmp

      Filesize

      300KB

    • memory/4820-45-0x0000000010000000-0x000000001004B000-memory.dmp

      Filesize

      300KB