Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 05:26

General

  • Target

    f5216cb55c5ba5cd10ae7ce3b8b3b357_JaffaCakes118.exe

  • Size

    201KB

  • MD5

    f5216cb55c5ba5cd10ae7ce3b8b3b357

  • SHA1

    a4fe9b476567ea0de8e30c00a982ade845ed7667

  • SHA256

    f16e92033095c6b4ffe4e4e8b27377660b8ecbc538be5968ec0e08b6b501aefa

  • SHA512

    9c6e256b3544a399fe3112b84ade808727686d9f947e6ffa3285843a6e4068157c6cc44681eede1e6bcd0857589009f08b32a8a4d49e221619acb1dc6228d8dc

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8Etka4kgnC:o68i3odBiTl2+TCU/DtkVk8C

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5216cb55c5ba5cd10ae7ce3b8b3b357_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5216cb55c5ba5cd10ae7ce3b8b3b357_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2700

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\bugMAKER.bat

            Filesize

            90B

            MD5

            3fa60903e2ff01c567425a9811277b78

            SHA1

            b05e478c1543ae076bc386abcfa1e434433ecac6

            SHA256

            69e147f5d7cac0e1e4b97d082b013d71dae26e11dfa05332b69fa4b0d71c5907

            SHA512

            c18f2a76bc3d39f85e1369420bb235cc4d1c722817f50427c702a97979cd63f71947741d39958382349c6f79abcad60e1e346e78f05b49e451495d0ad9248229

          • memory/2228-67-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2700-62-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB