Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 04:49

General

  • Target

    fbf6a6d48d9303cfd9f5bc20453c0091_JaffaCakes118.exe

  • Size

    620KB

  • MD5

    fbf6a6d48d9303cfd9f5bc20453c0091

  • SHA1

    a6d049e2020b293e0649f7b872c995a4093e3f52

  • SHA256

    e4e74a11a5e59edbb0c38b755bbd70f8cd60ddcdf9ca70a2e46e27e82103cfa1

  • SHA512

    2f218791747bb9bf797c822944b3ede36e5271bacf77d451d45b088361b66d747b3ca85ad0d02fbe9644dc5baf2d0d2fa4e0ce48d9aaa08cf58f4479e683217e

  • SSDEEP

    12288:0HrrqsjzQ9+51CsBXV+p5UWUITaD1OTi/HE/xLTYUDzOhO2c5hN:0HSsjg+1CbvUITaD1OzLtqh0N

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbf6a6d48d9303cfd9f5bc20453c0091_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbf6a6d48d9303cfd9f5bc20453c0091_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3012-0-0x00000000743E0000-0x000000007498B000-memory.dmp

    Filesize

    5.7MB

  • memory/3012-1-0x00000000743E0000-0x000000007498B000-memory.dmp

    Filesize

    5.7MB

  • memory/3012-2-0x0000000000500000-0x0000000000540000-memory.dmp

    Filesize

    256KB

  • memory/3012-14-0x00000000743E0000-0x000000007498B000-memory.dmp

    Filesize

    5.7MB

  • memory/3052-3-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3052-5-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3052-6-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3052-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3052-11-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3052-17-0x0000000004BA0000-0x0000000005C02000-memory.dmp

    Filesize

    16.4MB

  • memory/3052-18-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3052-36-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB