Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 16:56

General

  • Target

    f8654ec820d417bc9d1083ad22c90041_JaffaCakes118.exe

  • Size

    389KB

  • MD5

    f8654ec820d417bc9d1083ad22c90041

  • SHA1

    ed4b14a0a55f97fa937b8f8b8618e99e52d953d3

  • SHA256

    880a9175ad477119a0a20c399f77f6585a5e48ac56ce528d652d350e3411c624

  • SHA512

    c6875b0d723e6188a1481007f756823fefa2b8e8f3a54f8870f74aca80c903df9a9973614d89b7d7796fed6921e6a064e6d2b4bab432fff265b210d0f6f2befc

  • SSDEEP

    12288:usQO/b3k/ufkK5UcHS7hC98U7CJTZMpTbpM56Y:usF/bUuDmcHS3UrvpM5P

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8654ec820d417bc9d1083ad22c90041_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f8654ec820d417bc9d1083ad22c90041_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\windows\downloaded program files\gedbg.exe
      "C:\windows\downloaded program files\gedbg.exe" /i
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar2801.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Windows\0fe9872e.log

          Filesize

          128B

          MD5

          c5778378028e835b3aea812f1de5da57

          SHA1

          c3c7895bc6b9c040186ecdbd4dc4ea1565d6b438

          SHA256

          8b0502d6d1994e3742560fa6ad594964d2221c7b1e2af84f903729cfb492b0a7

          SHA512

          021f58e532690c2943fdeabe125abaf52010fc77e60706ddc761bfe8e3b0f68639e3f21eb05f148888258ad3314dde3ccf21908f956c8578b2f9fdabe66eddd3

        • \Windows\Downloaded Program Files\gedbg.exe

          Filesize

          389KB

          MD5

          f8654ec820d417bc9d1083ad22c90041

          SHA1

          ed4b14a0a55f97fa937b8f8b8618e99e52d953d3

          SHA256

          880a9175ad477119a0a20c399f77f6585a5e48ac56ce528d652d350e3411c624

          SHA512

          c6875b0d723e6188a1481007f756823fefa2b8e8f3a54f8870f74aca80c903df9a9973614d89b7d7796fed6921e6a064e6d2b4bab432fff265b210d0f6f2befc

        • memory/1288-0-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/1288-1-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/1288-4-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/1288-15-0x0000000002E60000-0x0000000002EC3000-memory.dmp

          Filesize

          396KB

        • memory/1288-77-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/2852-56-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/2852-72-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB

        • memory/2852-73-0x0000000000400000-0x0000000000463000-memory.dmp

          Filesize

          396KB