Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 10:50

General

  • Target

    fa23820ff42a8ab03b9339081d4efe68_JaffaCakes118.exe

  • Size

    105KB

  • MD5

    fa23820ff42a8ab03b9339081d4efe68

  • SHA1

    b5483bc16db3deec73f5ae3d08c905baf1a132df

  • SHA256

    b2ad1ae2c2d98ecb2403d81be3a818be84ad5bf8d1206e61a94bd0d09556c665

  • SHA512

    3a3a31c27d6623a45e852c3f9492ff5069a476bd62473bd91a7d95bc4931fa982ba285ed746a18fd041e48c778d5b31fc4c5a38f5705168d46c1ca8a2aaed3ea

  • SSDEEP

    1536:SKG8fZyRq9hka9E5m91Dsq5tkAJBpe/Ws1AztqoAUYiH1XG4kFGdDLUMP7jo9Rsv:SKZfQgz65m93rAqco/YWG3FGd1jw01WG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa23820ff42a8ab03b9339081d4efe68_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa23820ff42a8ab03b9339081d4efe68_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\tt.exe
      "C:\Windows\tt.exe"
      2⤵
      • Executes dropped EXE
      PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tt.exe

    Filesize

    97KB

    MD5

    0159f41b3bdbc764bdf6c115cfa0720e

    SHA1

    6ff0137c7235dd4a43e3fd72bf21051009c4ec92

    SHA256

    e91c822437f936fca8cf490552386459f79258fa2ba5a947b52b796e507dd7f7

    SHA512

    d65267f22f6a61cf0b1ef9bb497b45bfb4290b502c90f81f21b5762441659db3e191385d7f1c0b265d5b7bd3c54122f9e6dd9d5e50bebc9b5c5991baacbddd3a

  • memory/1560-9-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2968-0-0x0000000000400000-0x000000000041C200-memory.dmp

    Filesize

    112KB

  • memory/2968-4-0x0000000002BA0000-0x0000000002BD0000-memory.dmp

    Filesize

    192KB

  • memory/2968-10-0x0000000002BA0000-0x0000000002BD0000-memory.dmp

    Filesize

    192KB

  • memory/2968-11-0x0000000002BA0000-0x0000000002BD0000-memory.dmp

    Filesize

    192KB