Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 17:52

General

  • Target

    f1a4267ce37c0b474c4fa3e81dedccaf_JaffaCakes118.exe

  • Size

    199KB

  • MD5

    f1a4267ce37c0b474c4fa3e81dedccaf

  • SHA1

    dd44f43f7cacc0585eeec54d47cecb46084b5d42

  • SHA256

    2e5f1b59d27d3fda9cef7d1e0d3243026bc8d22a108197f250337ae295d55b47

  • SHA512

    41d95d6f3c6b2e046bb095d2bb83243f71954a35702d89398b00e1426bd6eeaceb570f053babb07e2980f5ead9e4417987680e7ed277d9e98cf42f5d67b9bde7

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B87pj7kgnYg:o68i3odBiTl2+TCU/W7k8b

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1a4267ce37c0b474c4fa3e81dedccaf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1a4267ce37c0b474c4fa3e81dedccaf_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      90B

      MD5

      c7f023b18cd93403180e8e8e9badb197

      SHA1

      5945a1142034b7eaf30c29ad2d12ec05653457fc

      SHA256

      c98bd87501b236293ff3016cca7645f9cd0bce2445ecd3a9fc2cc928d9523174

      SHA512

      4dfd48655198a9484382b77ff9afb2908d0ecdb13af3a779ea8410ff8fc1ac11189a0aea7d351d25ca6c7d034bcf5a686ee49c18385cf70b6f5bb5df66570b5e

    • memory/2072-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2628-62-0x0000000000720000-0x0000000000721000-memory.dmp

      Filesize

      4KB