Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 19:24

General

  • Target

    f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe

  • Size

    73KB

  • MD5

    f67efca3e64a257311b8a2e278128cce

  • SHA1

    78faa967d50f866f63b257c0829ef2539aeef3c9

  • SHA256

    7d815f06185e7a5499b37e426c66191f2174d4e82b2f669af0a168633ce17b16

  • SHA512

    449730d00098c9cb7113411684c4776292c8732936c9c20b5704b72a7dac6589d1d6c115d12f732d959bb3326c65c98d6a1b19d5d0edb039f09049157511288f

  • SSDEEP

    1536:W45qNJhWBZ5xaq2VXBRAIYO+MElTnz8MdQqzupKBVQB+/t9o2hNSAlvZJR:W/FKxaLRSO+MEnzD4KBaBw9lhNFhR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 2.bat
      2⤵
        PID:4976
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 2.bat
        2⤵
          PID:3592

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\2.bat

              Filesize

              42B

              MD5

              08409feff760da097349273e3c396884

              SHA1

              d530f5a50d2bd76d8c7c97343f806db11e78b88a

              SHA256

              13cb6eb5d95d299ce36973a31633fa0d73394fe1a51d61373d4f7efa3cb80d4c

              SHA512

              4ef729df5f805ca0007c618bde027ee3243be34bf9c3a66a5465299c1910bf0deddc9d8a08cfd0cf6973012bfe6c3cf109faa80fee94ed4fa12a232f5a16f54d

            • C:\Users\Admin\AppData\Local\Temp\2.bat

              Filesize

              53B

              MD5

              8d856891d061488c8fca4e071c7db6eb

              SHA1

              00d98a74477c27281a8e38ffd8a40c08e51b341d

              SHA256

              29f9eed1ad480b91ae4e33b6378e5f598c61bdf607f7363d099701c45e40f5ac

              SHA512

              ed43963addefba107fbd4ab6d9265118f99d48b8af66dd44cc3a5d5842e3965116b5af9ba7537d90f884029ed57fa0f67aafc1625fe26168b11718eda35ea531

            • C:\Windows\debug\B831406A9770.dll

              Filesize

              154KB

              MD5

              e23be3cce6ab7c704e9b91a58824de81

              SHA1

              e5f4494fbe79834c25097b8d241fcf169973c49a

              SHA256

              81ac9c1c1d271f5e12d262e4351242a42da7b3857ca2a9036f200e6e2895062e

              SHA512

              4023f4d8a7e5599afd106a59cb53f6fe0db1aa464625fc66861a80993733f1f16cfc8c2e974c4a64cf576f0f3a0262130343bdb9b2fb3771ff8715c10b117f3e

            • memory/3272-0-0x0000000000400000-0x0000000000450000-memory.dmp

              Filesize

              320KB

            • memory/3272-11-0x00000000006F0000-0x000000000071B000-memory.dmp

              Filesize

              172KB

            • memory/3272-15-0x00000000006F0000-0x000000000071B000-memory.dmp

              Filesize

              172KB

            • memory/3272-16-0x0000000000400000-0x0000000000450000-memory.dmp

              Filesize

              320KB