Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 01:58

General

  • Target

    f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    f008b0de94f1771f7cfd2a5b51a6ff90

  • SHA1

    9904cac611039d8b90913f86576017631f8d80de

  • SHA256

    258514730bb9fc1f9e192895664a3ce0953d1b29d7301c0247d5d72d1d569e3d

  • SHA512

    78494bc569bc45e3d382bfa69dab987cf4377b410be7b81d141c1e339bb3b818d5101bdaaea7fba8abce31bc52579cf5451b8b835e1e1305fdcdbb4f4790c94b

  • SSDEEP

    6144:rl4mjZF//vYdAiwH11XtVPNoguiv1Ihoay6y4EGf1:fr//QdABV1Xt3juC1IhNbDEe1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\564E.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3444
        • C:\Users\Admin\AppData\Local\Temp\5786.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\5786.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe5787.tmp"
          4⤵
          • Executes dropped EXE
          PID:2108
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:2372
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\564E.tmp\vir.bat

    Filesize

    1KB

    MD5

    20ca69bace1bd0aa4cc2af821fd4f54e

    SHA1

    032ac8a184df61a0adad4d13f42472ae4c7c7860

    SHA256

    64cd7802b4c7e5f32d8e59d46aa8f98824b16f3cf5fb47be12aa8b38c19a7599

    SHA512

    054f4868c615651789e74aa793b25737a8b5dfe4439a43a120b2dc2bc0c3e155d0a15ad1868c7e685b3a0d6e2559c9798e89eeaeed025c39ab0a0c2b10f31fd5

  • C:\Users\Admin\AppData\Local\Temp\5786.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\exe5787.tmp

    Filesize

    41KB

    MD5

    9cdcf02f847ddde1f3b62c676c5cc737

    SHA1

    1e28bc7716cb6adb55b1b397dbabbe31adba3cf2

    SHA256

    d7726cc05bcd788912a23fc85f233775da28cb0d4d2920c2be66e5cc69e2b7ae

    SHA512

    438303dceafa36ac40271d6b7759248357109cc479a53dd4eb472ab35d51f333f629be2da54fc113bcdcf2bb4bdf4201b5075351842d20d7e818c80a31b88e92

  • C:\Users\Admin\AppData\Local\Temp\exe5787.tmp

    Filesize

    41KB

    MD5

    2f87d51a25727565f97919c6e256755e

    SHA1

    7c52eede6d9acc8aa9ffe9a2a6d0b5826236bd87

    SHA256

    e55f04bee4d38617f02100199e9e1d3a59fc056fec42f176f0bdd57b30ef0da8

    SHA512

    4bfef26ba56ce3dde64447c59f880c590bc42c351d2bfabd0ab55a26ac4e022c1a309bb0d46206a569f35484e5f126a212f6f0379a2b57588413dfdfd76010da

  • C:\Users\Admin\AppData\Local\Temp\mpr591C.tmp

    Filesize

    24KB

    MD5

    b48fe5cc1b4805a0a54e631f6deb26c9

    SHA1

    7cfaa63997bcf66c044dc3b0aa20d8cedb169d83

    SHA256

    9742586ce18a7c276f942a6b41a08cfb5144f89145c1249ac4e44076b6212185

    SHA512

    5c00e4f15a3b0d5894e3fb88225930ed66b0e155ac5e6cfe8edfe80bf741de8311ae01bcff339974cf0dabc1663c87dbb45989310c270d6432ab550125078845

  • C:\Users\Admin\AppData\Local\Temp\s.dll

    Filesize

    700KB

    MD5

    ac3e2f16df5b8e004bc7528957957c95

    SHA1

    318dfb96abdc8e9d3778788dfdbb1f3dba885fba

    SHA256

    c53ac431faed8f5ab7c67b254f913efe0dceaafdbf26b02b930d07f45d840fe2

    SHA512

    4c60d3b255c38807a104e4362493dbf651fb8893633e94ee9a4c69770773f8d7bf95d310051154b9bd74d6eb1993626a5eb107e74e891d681f0398c64a7ebaf4

  • C:\Users\Admin\AppData\Local\Temp\vir.bat

    Filesize

    1KB

    MD5

    7bab57cf68ec8b5eb3bc7397a3915ff1

    SHA1

    85c4f9b51d9e03b53d8c04e93f84bdff89a811f8

    SHA256

    979344d0a3cd449f5766d5215bf6b1e3023cb3acd43c5eff1a4905e5d628eee4

    SHA512

    91fe2430a8f4ab18e86291e5063cd7e71648895a06b15034789e5e9656bede9b66a96a62b85322f2880e502a90b14dd4908dd2b2547b2519c40dac94b0330946

  • memory/1932-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1932-1-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1932-70-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2108-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2108-62-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB