Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 20:25

General

  • Target

    fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad

  • Size

    68KB

  • MD5

    fb1a1cbe5c8e18e282f58893408eac01

  • SHA1

    078c3d4f2863fec55fe56b5899a4124aba1e05aa

  • SHA256

    46fe1ecb4f3023cb7786d7760be277f01f4662c0ed2accedecf322de9a8b6e79

  • SHA512

    ff139b53ccdee1e673e46845581a2989b33121e6840030f67a0eba4e248008fa61033cb078301956716c6127cd904187b24fd9905ea02aad0dad281ee9c7ddb8

  • SSDEEP

    1536:EjUcFC+MEcfswy7GtW2insgvrGoZNGtW2insgvrGoZY:EjUctofA7ZsArG8ZsArGL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    75fb78960d3fb64ffcfb8c6d70767946

    SHA1

    ae7958fd43b3d4bf3457f8d75f4c3f0141330a51

    SHA256

    bbe4f6fe4932da5b20a7182713c5ece948120ca7b07ad2650f9128a21c862885

    SHA512

    1c355c5f3c530d058c0fa732e0b933a9d54069462f63872beed1df0a14ec5f447a0666e9112d2e989ad5d57398906e654625414d63516bf63d63748883a1f40d