Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 06:19

General

  • Target

    fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    fc1e7eba45bb977d149d544c6502ed5b

  • SHA1

    4dee797c570c50646fc39bf1381715d22e8b4fbb

  • SHA256

    d90caba2afccdde55362caf4ba52e8a40f75b9ded6d0fd421f467486c27d44ce

  • SHA512

    b76136ce9b51d61418c37a978b0c19037d034e34bf63f109ef9127bfb796557683a8eb6a93b9bb58514127f0dc58746cca5022380dd58b6b655cfa06414b7b8a

  • SSDEEP

    1536:L07Gg/h5hf/UajOc0IKSGLkX+/PJi1aWKxIGqYnIgUKItR9wC:A7Gg/h5hX3jcpxIu4sWKnnIgUfGC

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3188
      • C:\Users\Admin\AppData\Local\Temp\fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Users\Admin\AppData\Local\Temp\fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3436
        • C:\Users\Admin\AppData\Local\Temp\fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\fc1e7eba45bb977d149d544c6502ed5b_JaffaCakes118.exe
          3⤵
          • Drops file in Program Files directory
          PID:2656
          • C:\Windows\SysWOW64\notepad.exe
            notepad C:\Users\Admin\AppData\Local\Temp\Message
            4⤵
              PID:4068
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 444
            3⤵
            • Program crash
            PID:920
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 456
            3⤵
            • Program crash
            PID:1640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2840 -ip 2840
        1⤵
          PID:4912
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2840 -ip 2840
          1⤵
            PID:1456

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Message

            Filesize

            4KB

            MD5

            ae56233a0bf3a1524847cf913257c194

            SHA1

            e29821af10591a08b0b7c1d52f3c5d5bbf0c04d5

            SHA256

            7954c8f045f2dad1551b81e656821f093f5d366c267defff052238e0d289d083

            SHA512

            2d8f5d13e281516396f3ff6166b78bd50073a9de909a9895ccabcf92233e03a9bef9dbc10dc0bf2182b6f205c2522ca6a8678b4b5c5a9157871fb7315d5908c4

          • memory/2656-4-0x00000000004A0000-0x00000000004AA000-memory.dmp

            Filesize

            40KB

          • memory/2656-6-0x00000000004A0000-0x00000000004AA000-memory.dmp

            Filesize

            40KB

          • memory/2656-7-0x00000000004A0000-0x00000000004AA000-memory.dmp

            Filesize

            40KB

          • memory/2656-11-0x00000000004A0000-0x00000000004AA000-memory.dmp

            Filesize

            40KB

          • memory/2840-10-0x0000000040000000-0x0000000040024000-memory.dmp

            Filesize

            144KB

          • memory/3436-0-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/3436-2-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/3436-3-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB