Analysis

  • max time kernel
    142s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 04:55

General

  • Target

    f5146d735c95e4da7233f0539fbdb617_JaffaCakes118.exe

  • Size

    588KB

  • MD5

    f5146d735c95e4da7233f0539fbdb617

  • SHA1

    1a5c94de0c3ea2fd6cb7bf9784c37d88b313d94e

  • SHA256

    72d305f6d5a6075bcb74f76c4aee2ed48cbee0eff776d0c281c35621667483ea

  • SHA512

    38da00b7f22f8ccfa7b4212f0f677e33beddf5836512e3f614fda39c4b2fee263a060cd70ab205c0eea10d646adc397ef546743084a25f488a8d805d25540566

  • SSDEEP

    12288:yVGM5bY83LIMMCwJD19kxhV+CyYATY+M3s2dVznJxlWwoOe:mGM51bdMbPkxhpETY+4XC1

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5146d735c95e4da7233f0539fbdb617_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5146d735c95e4da7233f0539fbdb617_JaffaCakes118.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7e41cc36b25d911d311e9a928ea5ba89

          SHA1

          e5a08f2aebab04f62fcad7d2fc9b6a3c08b63a0d

          SHA256

          11c93f1af46e543b784f93f20491f362523bba58fe8418048dcd4a75f209668d

          SHA512

          f1554c02947c2e4f8af50b3e4334f82723f383a8335a42e247869d94ac0260b7e94aa849cc38128eae400bbdf504a049534b9d17702174d0efd5f6604473a38d

        • C:\Users\Admin\AppData\Local\Temp\CabB924.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarBAA1.tmp

          Filesize

          128KB

          MD5

          9cd0e33f7e8f7a47a54d6669e83fecca

          SHA1

          8a27729acd20c7406f7af338899b1fb845f15e7a

          SHA256

          c266acde18406dd5dbe79e5b78321f33dc8ae9c46267dfa706a405a2b5d51a43

          SHA512

          49c10df167c4fab49778b4b498f8021a294a4ff6b45d8ac8e1c365629e6ba6b40d048422216f34f3c30a0a9c2e9f702b015e673c5ca8be5336acccce4b0fea6a

        • memory/2236-75-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-76-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-2-0x0000000000320000-0x00000000003EC000-memory.dmp

          Filesize

          816KB

        • memory/2236-70-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-71-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-72-0x0000000002DB0000-0x0000000002EB0000-memory.dmp

          Filesize

          1024KB

        • memory/2236-73-0x0000000000320000-0x00000000003EC000-memory.dmp

          Filesize

          816KB

        • memory/2236-74-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-1-0x0000000002DB0000-0x0000000002EB0000-memory.dmp

          Filesize

          1024KB

        • memory/2236-3-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-77-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-78-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-79-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-80-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-81-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-82-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-83-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-84-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-85-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB

        • memory/2236-86-0x0000000000400000-0x0000000002CCA000-memory.dmp

          Filesize

          40.8MB