Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 19:48

General

  • Target

    ebdb4464103b5c7827c67bc5cb854c9e_JaffaCakes118.exe

  • Size

    675KB

  • MD5

    ebdb4464103b5c7827c67bc5cb854c9e

  • SHA1

    6ec7bbfe8fa3c295e672e00e3c71fa115650a9b9

  • SHA256

    2cfad80b48ead20a58614c9c111e7064eadc00e5a0f1753de5b1c4a2afb9f3f1

  • SHA512

    0e576964adce2434a64d31f6953bb2ac540bb8c323de4a304db1ccd75a03c16957df355f6621f979cae30dc4396197fc7c3ee0ec16ff6241646f1f48a71a5aba

  • SSDEEP

    12288:uf63OmNpfnBouDQEj5LMBc3hQO2/ZukVKTwJXXjVx+hzaLGJvIAYgZxo9p:c6+mXBomVLMBrXFKTwFjV0V6cQh0Ap

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebdb4464103b5c7827c67bc5cb854c9e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebdb4464103b5c7827c67bc5cb854c9e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\ebdb4464103b5c7827c67bc5cb854c9e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ebdb4464103b5c7827c67bc5cb854c9e_JaffaCakes118.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3024-38-0x0000000000400000-0x00000000004AE000-memory.dmp

          Filesize

          696KB

        • memory/3048-22-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-28-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-7-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-10-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-13-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-16-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-4-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-19-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-25-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-0-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-31-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/3048-34-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-2-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-39-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/3048-40-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB