Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 12:28

General

  • Target

    f37fa490d762e16bd415b9b587f985bc_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    f37fa490d762e16bd415b9b587f985bc

  • SHA1

    44e57ef62b851fd017d15674f1a628db6b3b5af2

  • SHA256

    259c363681c01f51a992907980ca7b1caf455b7280cd294c31a3383c50f45e35

  • SHA512

    2b3f8457d20754c79fbe0741376f45ea7b98b0153d34b006c76428d1db9464fc8b14d8c523ad58ce7623b0bb1f2009fdd2a6983e8964dee48964b3d5382951b4

  • SSDEEP

    6144:xcWMJJhqryYP/SashTJbNFwD3e+2XZHrPu1lQCju:xczJJhqrVPajr+D3ebHrPuPju

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f37fa490d762e16bd415b9b587f985bc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f37fa490d762e16bd415b9b587f985bc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\server_et.exe
      "C:\Users\Admin\AppData\Local\Temp\server_et.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Roaming\mservice32_t.exe
        "C:\Users\Admin\AppData\Roaming\mservice32_t.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\server_et.exe

    Filesize

    337KB

    MD5

    e14f244c6019a6881f3eb10de06cc9ea

    SHA1

    4924d8f95ebe8d15090253993e415cfac3d75932

    SHA256

    bfd50830e32b4bb353a848f7bbb50af7463bd1fde9b76b77c47b98e90573143e

    SHA512

    436e7aca308eb90505bc7364b1ee67f1d010e5a6bc856531e6927af79ad7384461f1d1d68bf45283abfb70a968ba014efd084c2857926023b6498595162676e7

  • memory/2176-10-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2176-20-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2640-23-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2640-24-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2640-26-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB