Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 05:56

General

  • Target

    f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    f766393d13d965c1c7596cd17349e37b

  • SHA1

    e0862539e209498bd204eff93e26a86a49650c91

  • SHA256

    c33d9bbc6f50434a98b2d4b4c9a88492842926fd543b04e2b3514fa9822f390a

  • SHA512

    a7470995260cdeb8c2e3620c07e9e11d14d8b420eff12a05273d75810ae99e3ec3677bee8eada203f62923560442124212d3bd54ba8740b0576abbb3e38c8be1

  • SSDEEP

    6144:INTsItWNWAi7QjFbu4TnBWnKqgKjgc6fzKX7zKv23yV36fW9dGkMYv68yc:clWMAiIbz0KqLKuXXKuLfWbvq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\ProgramData\bE01836BkOnE01836\bE01836BkOnE01836.exe
      "C:\ProgramData\bE01836BkOnE01836\bE01836BkOnE01836.exe" "C:\Users\Admin\AppData\Local\Temp\f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\bE01836BkOnE01836\bE01836BkOnE01836

    Filesize

    192B

    MD5

    1bf2cd0f185c8f8d8be803046b07328c

    SHA1

    ba8ed8926c6d2c4ebe00efd1110ff966fbff274c

    SHA256

    9d1272f18328b8a9f52f4f8a92c94d271b84aae213449a88e68816836658de3d

    SHA512

    671347fe369a39abbf34f80b7e87b2e3309418e7e72e0fc62ed412c1a24df2c0f91ef9396ebeb957e7ac1c8181c3049d6d4d8710282c1e7640a05636373b6199

  • \ProgramData\bE01836BkOnE01836\bE01836BkOnE01836.exe

    Filesize

    388KB

    MD5

    7943388bf23a0d562cbf27e212cfe84e

    SHA1

    0bf60a603ed7bba34d89bdcffbc96227b0165ea4

    SHA256

    a6ad9a706165728d952d681f8351d211e423a52af2def7c874c6c697ae4b1b82

    SHA512

    93842255a9b1012b5bb608aa1913225e454e66aff2fc89f8ad2933d3e8a81e280bde08ea387606692302b1392f4b58deba299c02d529cff33fc419dda9ff7406

  • memory/2664-23-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2664-27-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2664-36-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2936-0-0x00000000002B0000-0x00000000002B2000-memory.dmp

    Filesize

    8KB

  • memory/2936-3-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2936-16-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB