Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 02:46

General

  • Target

    fbc22b99ae504a75e702481fd6969619_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    fbc22b99ae504a75e702481fd6969619

  • SHA1

    8100ba98413cd08a79cf8f2b83806b146683c8b4

  • SHA256

    73ff48957d053c75e324bb97065d4a3970291add9f298293709a7082977cba91

  • SHA512

    c50d834a9a385cd11f1e22510ebcc52d5cfea551e6bf9d27da214f4da52dfccfb9dd8681f14ec006d0f2109c671140468bf1e527ac6c4bd07d3b98fc82549559

  • SSDEEP

    12288:/bqWkA4fEgQ/Ms4b3eyWctXXfC4awgsqFITeqVIu:/WWh4f1tLeyWcRq4a/vITeqCu

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbc22b99ae504a75e702481fd6969619_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbc22b99ae504a75e702481fd6969619_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-0-0x0000000001B60000-0x0000000001B61000-memory.dmp

    Filesize

    4KB

  • memory/2180-4-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-3-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-2-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-1-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-8-0x000007FEF5710000-0x000007FEF5841000-memory.dmp

    Filesize

    1.2MB

  • memory/2180-10-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-12-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-13-0x0000000001B70000-0x0000000001B7A000-memory.dmp

    Filesize

    40KB

  • memory/2180-11-0x0000000001B60000-0x0000000001B61000-memory.dmp

    Filesize

    4KB

  • memory/2180-14-0x000007FEF5710000-0x000007FEF5841000-memory.dmp

    Filesize

    1.2MB