Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 19:24

General

  • Target

    f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe

  • Size

    73KB

  • MD5

    f67efca3e64a257311b8a2e278128cce

  • SHA1

    78faa967d50f866f63b257c0829ef2539aeef3c9

  • SHA256

    7d815f06185e7a5499b37e426c66191f2174d4e82b2f669af0a168633ce17b16

  • SHA512

    449730d00098c9cb7113411684c4776292c8732936c9c20b5704b72a7dac6589d1d6c115d12f732d959bb3326c65c98d6a1b19d5d0edb039f09049157511288f

  • SSDEEP

    1536:W45qNJhWBZ5xaq2VXBRAIYO+MElTnz8MdQqzupKBVQB+/t9o2hNSAlvZJR:W/FKxaLRSO+MEnzD4KBaBw9lhNFhR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 2.bat
      2⤵
        PID:2908
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c 2.bat
        2⤵
          PID:2640

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2.bat

        Filesize

        42B

        MD5

        08409feff760da097349273e3c396884

        SHA1

        d530f5a50d2bd76d8c7c97343f806db11e78b88a

        SHA256

        13cb6eb5d95d299ce36973a31633fa0d73394fe1a51d61373d4f7efa3cb80d4c

        SHA512

        4ef729df5f805ca0007c618bde027ee3243be34bf9c3a66a5465299c1910bf0deddc9d8a08cfd0cf6973012bfe6c3cf109faa80fee94ed4fa12a232f5a16f54d

      • C:\Users\Admin\AppData\Local\Temp\2.bat

        Filesize

        53B

        MD5

        8d856891d061488c8fca4e071c7db6eb

        SHA1

        00d98a74477c27281a8e38ffd8a40c08e51b341d

        SHA256

        29f9eed1ad480b91ae4e33b6378e5f598c61bdf607f7363d099701c45e40f5ac

        SHA512

        ed43963addefba107fbd4ab6d9265118f99d48b8af66dd44cc3a5d5842e3965116b5af9ba7537d90f884029ed57fa0f67aafc1625fe26168b11718eda35ea531

      • \Windows\debug\B831406A9770.dll

        Filesize

        154KB

        MD5

        e23be3cce6ab7c704e9b91a58824de81

        SHA1

        e5f4494fbe79834c25097b8d241fcf169973c49a

        SHA256

        81ac9c1c1d271f5e12d262e4351242a42da7b3857ca2a9036f200e6e2895062e

        SHA512

        4023f4d8a7e5599afd106a59cb53f6fe0db1aa464625fc66861a80993733f1f16cfc8c2e974c4a64cf576f0f3a0262130343bdb9b2fb3771ff8715c10b117f3e

      • memory/2648-0-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB

      • memory/2648-19-0x0000000000220000-0x000000000024B000-memory.dmp

        Filesize

        172KB

      • memory/2648-22-0x0000000000220000-0x000000000024B000-memory.dmp

        Filesize

        172KB

      • memory/2648-23-0x0000000000400000-0x0000000000450000-memory.dmp

        Filesize

        320KB