Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 05:45

General

  • Target

    f9a0948788eb245c1b83c2245ea0f086_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    f9a0948788eb245c1b83c2245ea0f086

  • SHA1

    5f886a7e4de292861d4087b208e1c0ac4d3a2d01

  • SHA256

    31633f35dc70a3495c0f01a44a5454109c081db0246ed14aad6145dd3d209ff1

  • SHA512

    e04bba119e7636a3b81069cced9aa2a13e60a002866580f2599b977dfa7713aeeda77d2b4bd7bc214037c78dce3418e4de241f657f5538061ddd9a5d681a22ec

  • SSDEEP

    768:tMQoGBwklqKSf2+vblbO1M72eJ9AYLacN5xyLO93kcPCjG4F8x4XrYI+GG:2tKvylbR7h9Znr/9u64fVG

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9a0948788eb245c1b83c2245ea0f086_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f9a0948788eb245c1b83c2245ea0f086_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\KillMe.bat
      2⤵
      • Deletes itself
      PID:2248
  • C:\Windows\SysWOW64\kusn33sd.exe
    C:\Windows\SysWOW64\kusn33sd.exe -j
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\KillMe.bat

    Filesize

    239B

    MD5

    3d9520e6c00d1b8d8eaa9754820368c3

    SHA1

    70b06ea7e56609c9ef348aaba1ecc4fdbf1c6ab5

    SHA256

    ec683108c45d615d5e2f6e5d7c77a82770f92d42c1bfc3667170afcc197a0051

    SHA512

    a6358fc061dd9803fb98e68e1de928512b3ab0df5c99598a0b4dab138b87978ae59862a7599a541a98f7ce00f37b187ba8b24ec92b625b942613528973c09745

  • C:\Windows\SysWOW64\kusn33sd.exe

    Filesize

    44KB

    MD5

    f9a0948788eb245c1b83c2245ea0f086

    SHA1

    5f886a7e4de292861d4087b208e1c0ac4d3a2d01

    SHA256

    31633f35dc70a3495c0f01a44a5454109c081db0246ed14aad6145dd3d209ff1

    SHA512

    e04bba119e7636a3b81069cced9aa2a13e60a002866580f2599b977dfa7713aeeda77d2b4bd7bc214037c78dce3418e4de241f657f5538061ddd9a5d681a22ec

  • memory/2860-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2920-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB