Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 07:35

General

  • Target

    f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.exe

  • Size

    2.9MB

  • MD5

    f54a82a9d9dc17dd5eb61c17e136c588

  • SHA1

    dbda194c60e40307ecbe65bc1f79767fa6f0a878

  • SHA256

    6f5cd8c23aa7a9cc249f0c524f5ca1594f461c528ef4bcfd6f984dc3d5a70dc8

  • SHA512

    69ce3d610687bdc4e2e905b5704a76fc38af751cece16147daa9bbca1c66b43645b62a4ca9a471a1d31733cb57cc955ee9638ce9ecf50e4d90d1a120839338ff

  • SSDEEP

    49152:2a9RGEPc+ISjWc9rISBAG6exspO7SoG14+vkYOrf8wGmhcxOCn1wC+g8db/5IBuT:n9RGEQpKIS+EuEPJjWYqF+gua++TVJeH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\is-HVH1N.tmp\f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-HVH1N.tmp\f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.tmp" /SL5="$4001C,2705916,77312,C:\Users\Admin\AppData\Local\Temp\f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-CK0OD.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-CK0OD.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • \Users\Admin\AppData\Local\Temp\is-CK0OD.tmp\psvince.dll

    Filesize

    36KB

    MD5

    a4e5c512b047a6d9dc38549161cac4de

    SHA1

    49d3e74f9604a6c61cda04ccc6d3cda87e280dfb

    SHA256

    c7f1e7e866834d9024f97c2b145c09d106e447e8abd65a10a1732116d178e44e

    SHA512

    2edb8a492b8369d56dda735a652c9e08539a5c4709a794efaff91adcae192a636d0545725af16cf8c31b275b34c2f19e4b019b57fb9050b99de65a4c08e3eee1

  • \Users\Admin\AppData\Local\Temp\is-HVH1N.tmp\f54a82a9d9dc17dd5eb61c17e136c588_JaffaCakes118.tmp

    Filesize

    710KB

    MD5

    02af54d9e8f925a10e2fbdd119e4c8d2

    SHA1

    0457bb1f89d2596266634d5ae792257086caf662

    SHA256

    53dbf2debbb7811846feba931a246ec87cb1e614389760b40b5ac0255eac04a7

    SHA512

    25c05a8be8cd14981fdbc6d5f3e729aa0fa6b05e2500c38d2f935c2cec828da65bc9ac01cc6c11b0a3fb917321534b99f2007851658370594282cf2377084438

  • memory/2076-11-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2076-17-0x0000000003700000-0x000000000373C000-memory.dmp

    Filesize

    240KB

  • memory/2076-25-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2076-26-0x0000000003700000-0x000000000373C000-memory.dmp

    Filesize

    240KB

  • memory/2076-30-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2512-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2512-24-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB