Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 19:06

General

  • Target

    f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe

  • Size

    602KB

  • MD5

    f1b5b6cb53076e23c387743a5e75c5ad

  • SHA1

    08815abb077d98af8c83526ad58fa09a33956ba3

  • SHA256

    3d3cb28adbf4ef03bf8dcff05f70ef6e95849eaafcb9a6ab4691f9b439d194ea

  • SHA512

    21215c25d95e6f9a918e9791608c8aedb76873c10a7d3ef530be0f774fc606cf2c1de27d5b54b08f067b8bf0627848bf8a2bcbc44cf4c52fc9f2b10159a45fd0

  • SSDEEP

    12288:cnepKaV9OaW0FjM7rxUpwEiAfKzG5dliFuJ2lkrdcakCoDL4+gt:MS/f7FjOrxkwEiGliFPl4taDL4+

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Windows\system32\adtapi.dll",install
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" "C:\Windows\system32\adtapi.dll",watch
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2520
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" "C:\Windows\system32\adtapi.dll",xserve
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\adtapi.dll

          Filesize

          482KB

          MD5

          c9e6354da74735651c4cf9275c3025f5

          SHA1

          8f604d3e1321141779ae6faaa8f1d447dd175efd

          SHA256

          23831333b5c91ff4e467b004fb362b3a117800ff254d30d831bdccb42ba43ffd

          SHA512

          9faeeb29268c664dee255fdf8d83f0bccfbcdfe0d1df16a9a4d812b69f04421e9cfda8f86adbf44f5cb8db9c0ff47a24769fb39b5a41caf602ffce483ae3a1e7

        • memory/820-9-0x00000000004D0000-0x00000000005D0000-memory.dmp

          Filesize

          1024KB

        • memory/820-8-0x0000000074C50000-0x0000000074D57000-memory.dmp

          Filesize

          1.0MB

        • memory/2520-49-0x0000000002510000-0x0000000002617000-memory.dmp

          Filesize

          1.0MB

        • memory/2520-52-0x00000000006A0000-0x00000000007A0000-memory.dmp

          Filesize

          1024KB

        • memory/2520-15-0x00000000006A0000-0x00000000007A0000-memory.dmp

          Filesize

          1024KB

        • memory/2520-24-0x0000000002670000-0x0000000002770000-memory.dmp

          Filesize

          1024KB

        • memory/2520-23-0x0000000002510000-0x0000000002617000-memory.dmp

          Filesize

          1.0MB

        • memory/2520-53-0x0000000002670000-0x0000000002770000-memory.dmp

          Filesize

          1024KB

        • memory/2520-48-0x0000000074C50000-0x0000000074D57000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-38-0x0000000002590000-0x0000000002690000-memory.dmp

          Filesize

          1024KB

        • memory/2648-39-0x0000000002480000-0x0000000002587000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-51-0x0000000002480000-0x0000000002587000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-50-0x0000000074C50000-0x0000000074D57000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-29-0x00000000006C0000-0x00000000007C0000-memory.dmp

          Filesize

          1024KB

        • memory/2648-58-0x00000000006C0000-0x00000000007C0000-memory.dmp

          Filesize

          1024KB

        • memory/2648-59-0x0000000002590000-0x0000000002690000-memory.dmp

          Filesize

          1024KB

        • memory/2984-43-0x0000000000400000-0x0000000000498000-memory.dmp

          Filesize

          608KB

        • memory/2984-1-0x00000000020A0000-0x00000000021A0000-memory.dmp

          Filesize

          1024KB

        • memory/2984-0-0x0000000000400000-0x0000000000498000-memory.dmp

          Filesize

          608KB