Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 20:13

General

  • Target

    f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe

  • Size

    431KB

  • MD5

    f69466447da5986d13a70f1166e3cf59

  • SHA1

    9c8eb16cff3e8ac2fae223e367dcc953a40a8365

  • SHA256

    14f75ba266b38ccf8041f234d9a89c59d0df1962d21090606b1fce4099cf4a71

  • SHA512

    029ca578e52763beee87811505674276194e1511821f5120f47619cceab972d7ef681885cb5ac45fde900d2de6f758aa75ae9e7c51ef5bdf376442147d1394ec

  • SSDEEP

    12288:ZM7j6Tbmj3p3jD/6CPIjQCcZzE5mE3BNtBlDDd:ZA8kHiotZzSmENBF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\ProgramData\iEfHhBe15403\iEfHhBe15403.exe
      "C:\ProgramData\iEfHhBe15403\iEfHhBe15403.exe" "C:\Users\Admin\AppData\Local\Temp\f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\iEfHhBe15403\iEfHhBe15403.exe

    Filesize

    431KB

    MD5

    3cf15926b08ff300801aa0dc04380367

    SHA1

    7156e7e4fb26fa7c14a420603247bd7a58c05af2

    SHA256

    448cf54ae32ebda4d8c92f8e155a0645191d56ac41a22df12a8a2e357cf9f236

    SHA512

    1cd511821ee64992d6d65c5bd07604f257048de3d52a40d3050ee80d955f5d6d9d3061414a7f9d2bd2fd7e61bdfebdb69fca662fd2807c4d0124dd23f7ab968b

  • memory/756-17-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/756-15-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/756-16-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/756-22-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/756-26-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/756-39-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2660-2-0x0000000000920000-0x0000000000A20000-memory.dmp

    Filesize

    1024KB

  • memory/2660-1-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2660-0-0x0000000000920000-0x0000000000A20000-memory.dmp

    Filesize

    1024KB

  • memory/2660-21-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2660-25-0x0000000000920000-0x0000000000A20000-memory.dmp

    Filesize

    1024KB

  • memory/2660-54-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2660-55-0x0000000000920000-0x0000000000A20000-memory.dmp

    Filesize

    1024KB