Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 13:28

General

  • Target

    eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad

  • Size

    132KB

  • MD5

    eb2be0942c9f7ddf0c758399dcbf2aed

  • SHA1

    f7892efe848c5b98595a4e8f98182f313bad607e

  • SHA256

    8e8617a1701e445cf07f2695f3617ce856f5c16723d41493aabde876c5daf592

  • SHA512

    92271e2ba76b805d12111609feac4fd0fbab613ab5c038913897a0f4623623f306c629d2c8b35805aa3d51b33478527ef129acad7a24f2dff7f4f6c041c980e6

  • SSDEEP

    3072:6uVKH6pVBLlxtGrR7VgjAU6vhP8he7aS9N:9KH6pP4sjAptEe7aC

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d30474cde1915fa40baf8f20b5a0dc32

    SHA1

    48b73fa1e5846b1c7c3808d2495c834b58175d31

    SHA256

    61bd8398d9fd70c028ad35c8f8cf8de8a1f6facc716f397f7e68690b3aa06e8c

    SHA512

    de6c23332e98e01ca0b07f66bbdb4be5131da05371c2a51b061612eed1a3563473bcf842436aa020470a060dfb0313014d4215750658458f1a0658cefc419474