Analysis

  • max time kernel
    143s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 23:09

General

  • Target

    fdddd62f1e4d79b6f82f96ad1f786bcf_JaffaCakes118.exe

  • Size

    2.8MB

  • MD5

    fdddd62f1e4d79b6f82f96ad1f786bcf

  • SHA1

    64bbe0039b8413401239dae1309e196f2ccbc192

  • SHA256

    f184f263551f82bc1b83d454589da2906e76b6cf2140aaeef3703aa20914f121

  • SHA512

    60f252dcf5fcd9c38efacc4e17e863ff47924e62f91134039d0ebfc070c927cee4676ed81f8d1a4fbea156ea9efb409fb8ee9c70c0ce12e5583d356a3c2b54c8

  • SSDEEP

    49152:+sefR30vKQHQZVFVhlFCYE99P7NNeBK/v9ml+FYj3sbwld458DaJj0eo/bBl7hYP:+BRkSQHGFJFCYI9P7Ss/v9u+uUwUSaJr

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdddd62f1e4d79b6f82f96ad1f786bcf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdddd62f1e4d79b6f82f96ad1f786bcf_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4436
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1136

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsyE726.tmp\tools.dll

      Filesize

      236KB

      MD5

      e12f05661436f2974cf91b5fc76fb5f4

      SHA1

      5e0b7887950204713bef3da0018911279f2540ec

      SHA256

      1873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc

      SHA512

      61d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d

    • memory/4436-18-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-19-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/4436-20-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/4436-24-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-26-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-27-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/4436-28-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/4436-29-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-31-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-32-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-33-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-34-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-35-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-36-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-37-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-38-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB

    • memory/4436-39-0x0000000003580000-0x0000000003590000-memory.dmp

      Filesize

      64KB