Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 01:05

General

  • Target

    f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe

  • Size

    263KB

  • MD5

    f6f5eb2cc4d9e875991b3c56bdfd3366

  • SHA1

    ff02aa218d38dacf961c4b924686bc95225056f3

  • SHA256

    e13e87b98f0a1e4c7e6c69f2bc8a5ed065fca7151dc77894de0ba8d2b8cb35f2

  • SHA512

    a8380b67b0afe40a4c7511f8e0a0d528f8c1d900d29b5eb7c3dd09dcbfb0acdf2e7106283ae0d160e9402d0c4ada89f077129605ecb150be8a5ebda5f4803577

  • SSDEEP

    3072:sfYcityDzpeTNPF77mnVKtW4728yQZ1kGnCek3AniTtj1j649:Sr+EFeTNPxmVKtWsyO19k3eipJj64

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\msa.exe
      C:\Windows\msa.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

    Filesize

    372B

    MD5

    39bee6ae1862c06b91f7f6e784d4181c

    SHA1

    dfdb07cd600b3fea03627fda3639be705bdae2d6

    SHA256

    c105ababb2ebc63f320923aa713fc8773bb654e572d3f0dd2d50957f15b007c3

    SHA512

    a89132ec42761817286e5c9445a08b5a5ab3af7cb054300e61a3b2c01da13271fb5337a76815417b765e44b98e1f8a81ac50239781a68ff9c10bf3c67138973e

  • C:\Windows\msa.exe

    Filesize

    263KB

    MD5

    f6f5eb2cc4d9e875991b3c56bdfd3366

    SHA1

    ff02aa218d38dacf961c4b924686bc95225056f3

    SHA256

    e13e87b98f0a1e4c7e6c69f2bc8a5ed065fca7151dc77894de0ba8d2b8cb35f2

    SHA512

    a8380b67b0afe40a4c7511f8e0a0d528f8c1d900d29b5eb7c3dd09dcbfb0acdf2e7106283ae0d160e9402d0c4ada89f077129605ecb150be8a5ebda5f4803577

  • memory/2804-15133-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2804-1-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2804-0-0x00000000020A0000-0x00000000020B5000-memory.dmp

    Filesize

    84KB

  • memory/2804-11-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-43573-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47513-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-28478-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-35918-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-8-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47510-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47512-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-10022-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47514-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47515-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47516-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47517-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47518-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47519-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2868-47520-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB