Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 08:38

General

  • Target

    f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    f563a3085f5ac282e858b3fd48f0f076

  • SHA1

    9ff0bac4985b24c5712a499f67b5815290fe4ecf

  • SHA256

    20b5e5b6849ad2417cdbd147abbc378672014dac6c0acc51e5c07ad4ebc78661

  • SHA512

    127962aa7c36cdbea853e4404cc6e24c13a9a7b569ae1d4b0e57f6f4cfade4e17ac864c5c1c9db79af712ae34f3533f00bcb09d9e4dcc2334fcbb4a51c0d18ab

  • SSDEEP

    384:qqPKe+NmiOtoCOQFuZqhYE1Ff4z+K6/2tAMOGa:qTHmiOtDOQD7DfmEz

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\7C80.tmp.bat
      2⤵
      • Deletes itself
      PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7C80.tmp.bat

    Filesize

    207B

    MD5

    e4804551569169699b7ee912edfb75e8

    SHA1

    2552170de58223995ddf5743942990ffcb56f00a

    SHA256

    835a48b29b4d3313051d47813fefce5a3ec55747e64acdc1dd437e502f3a5e8b

    SHA512

    169155bb2b5aa4e9bf8b8e9bb21b87cc3dda93c864a175d7f9080ab7b26847c134d5676ac0bb3c90ab5b8c0a66a5dd13cf51b45f4d7eb3afc2a4117e56651b07

  • C:\Windows\SysWOW64\vebicxng.nls

    Filesize

    428B

    MD5

    3d704389844f722042858e93ffb3bdeb

    SHA1

    325a82a71da4b8d9ddbde44cac9929e84af43ccb

    SHA256

    47e2996c1cf6f4a0d91469cb0524d9e76fa3117ddcbeeebe46700dc8695b1dfd

    SHA512

    3bc7ba549b97b6e3f3b7bb85ffbf030ea03460fe1be824fc22319b07f2548cb5aee6efc9ff1be3b366db370c377e21a958c8e02e9199f22dd9d862181327a716

  • C:\Windows\SysWOW64\vebicxng.tmp

    Filesize

    2.2MB

    MD5

    56af05a61e260ed71d005449220d02db

    SHA1

    c4aa2ff36c80a6f480377954775ee35f7041c708

    SHA256

    1426a41a901110e189f470528712e1e373b01d7398380bac46b98171721dc49b

    SHA512

    c0d471b9563f60a67e5d2e344de95c2e97e490a22f10609529d347dd0d584610edcbc0f40fa533afcb58a8f144ee5ac59d4f07fe9850f7756fa984c84eff4eae

  • memory/2820-16-0x0000000010000000-0x000000001006C000-memory.dmp

    Filesize

    432KB

  • memory/2820-25-0x0000000010000000-0x000000001006C000-memory.dmp

    Filesize

    432KB