Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 05:11

General

  • Target

    fc0062783cfb280dda285dda96123469_JaffaCakes118.exe

  • Size

    61KB

  • MD5

    fc0062783cfb280dda285dda96123469

  • SHA1

    62b7af2f2c3d056d1eda1dbb07cc82a668ffd990

  • SHA256

    881b7e78e581f59ec6b6ff5dfdd7134af869d7b88e56902dcbdca2d907ac39d1

  • SHA512

    8a95404235681660a11f9110da51cee9f6847b0917f2a86dcce6b933b2e5a3c8351d84f009a282ee9e61fc5968ae285a39163b36bccb8f7759fbdde6ed622851

  • SSDEEP

    1536:wSHg93C5n6k0QdYA8A7ZP6ZTM732IfuyZN:wSRV6698Pi73XfD

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc0062783cfb280dda285dda96123469_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc0062783cfb280dda285dda96123469_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2020

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2020-0-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2020-5-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB