Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 16:59

General

  • Target

    f8662b329f66cd3b4a26bc82ffcce7cc_JaffaCakes118.exe

  • Size

    294KB

  • MD5

    f8662b329f66cd3b4a26bc82ffcce7cc

  • SHA1

    49c7f3c0522266baeb6c9d6cda8ddc79722f79d5

  • SHA256

    14eb647028f1b3fc6e7fe645624cca094356b8a3083baf05b49098c3373e0f51

  • SHA512

    2f031059e3560c13b5cc235485723d545c609c356bf3ca47546331f432d1a2588b7ec63910427782f8d06d429c1a3224803ca222db6d853bd4c8fd28c1949719

  • SSDEEP

    6144:qmcD66RRj35JGmrpQsK3RD2u270jupCJsCxCY:fcD663GZ2zkPaCxB

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\f8662b329f66cd3b4a26bc82ffcce7cc_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f8662b329f66cd3b4a26bc82ffcce7cc_JaffaCakes118.exe"
        2⤵
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
            PID:2320

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1396-3-0x0000000002A40000-0x0000000002A41000-memory.dmp
        Filesize

        4KB

      • memory/2320-242-0x00000000000A0000-0x00000000000A1000-memory.dmp
        Filesize

        4KB