Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 23:33

General

  • Target

    fde8b793c9a5c5833ea99ed1aa5c6f4c_JaffaCakes118.exe

  • Size

    587KB

  • MD5

    fde8b793c9a5c5833ea99ed1aa5c6f4c

  • SHA1

    3a04f52b648801331b887ba8031d0455f54f2c8e

  • SHA256

    817e85ca4fddb19755670848abfd2dbdb943b5963cb6b58f8234b5f450e38e84

  • SHA512

    457c8b9915e60e29c7576a64a3d6838f9d6cad2925fc8162cb9bd10411143fb2f26223e6615c2444cbd6194db17e68169d65669d40d4e550d84c89646d740997

  • SSDEEP

    12288:tthN4o1mIIWKd2QAPJtMPo/aiOHETa/I19mX8:t/6o9IWK8IPG8HEe/I1ks

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fde8b793c9a5c5833ea99ed1aa5c6f4c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fde8b793c9a5c5833ea99ed1aa5c6f4c_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping_www.antekecrew.net_-t
      2⤵
        PID:1732
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ping_www.antekecrew.net_-t
        2⤵
          PID:64
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ping_www.antekecrew.net_-t
          2⤵
            PID:2564

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2348-0-0x00000000020F0000-0x00000000020F1000-memory.dmp

                Filesize

                4KB

              • memory/2348-1-0x0000000000400000-0x0000000000499000-memory.dmp

                Filesize

                612KB

              • memory/2348-30-0x0000000000400000-0x0000000000499000-memory.dmp

                Filesize

                612KB

              • memory/2348-31-0x00000000020F0000-0x00000000020F1000-memory.dmp

                Filesize

                4KB