Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 10:05

General

  • Target

    ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    ead1f7d573b4460944217f4030f22964

  • SHA1

    2b9d6d4439bc1d9e47f9960472b97881f685fe85

  • SHA256

    21f2eabbc51d9b7a7c33837fb35f9897b1102fd5361ba652efb5180433763140

  • SHA512

    5604d7c6ed69bf803ae294226d49086eb655c74433b93bc1fd52f139092f3999d1271fb538c1b2d405968d3b2816be4e5c979fba62de30c1c09cc3fdc33f983e

  • SSDEEP

    768:9nS+RC2/CiOBglMJx6kZjuTHbA8Y4uwdAb46B+CtOw+0GxTMlxTkjt3n7mBG:99SAlM7tju/4wdL8hOYG0ojtSQ

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe"
      2⤵
      • Modifies firewall policy service
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\7767969599757996844\winsvc.exe
        "C:\Users\Admin\7767969599757996844\winsvc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\7767969599757996844\winsvc.exe
          "C:\Users\Admin\7767969599757996844\winsvc.exe"
          4⤵
          • Executes dropped EXE
          PID:2448

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\7767969599757996844\winsvc.exe

          Filesize

          84KB

          MD5

          ead1f7d573b4460944217f4030f22964

          SHA1

          2b9d6d4439bc1d9e47f9960472b97881f685fe85

          SHA256

          21f2eabbc51d9b7a7c33837fb35f9897b1102fd5361ba652efb5180433763140

          SHA512

          5604d7c6ed69bf803ae294226d49086eb655c74433b93bc1fd52f139092f3999d1271fb538c1b2d405968d3b2816be4e5c979fba62de30c1c09cc3fdc33f983e

        • memory/1048-2-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1048-3-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1048-20-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2448-58-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2448-57-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2664-56-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2664-54-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/3060-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/3060-18-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-14-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-21-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-22-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-12-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-10-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-8-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-6-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3060-4-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB