Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 07:05

General

  • Target

    fc32b8cb97dee4b4e9b8d45a6517021e_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    fc32b8cb97dee4b4e9b8d45a6517021e

  • SHA1

    d5b4af1fa885649a5b3b20c5ebfe0ecf0ea00207

  • SHA256

    e47f0b70591b416fee37b78dafe7e7ee3c6d2381d13687622214557efc85a1c8

  • SHA512

    5c9ee54f878068fc69642a2d2d9a73c52a2878260fc25eeed9071cb9338c1da239c756def498d96f304c377abef66b00d068eec5ecfcc9b5e3b4ef88ced6a571

  • SSDEEP

    3072:51FyGGekVZDFTXD026rpVu0z8MW9E3i2Bm9rkpmobchn4NSji7GQBhC:5DfOrBLgppUUib94pPb9C

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc32b8cb97dee4b4e9b8d45a6517021e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc32b8cb97dee4b4e9b8d45a6517021e_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\~Temp.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2400

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            c77c33f001c0cd2556695341ffe5773a

            SHA1

            ef38e326e22fe98493cc851b745ad4062effce71

            SHA256

            60425d4a413123138ddf782e8a8d31de9231207372ed1617274047786337cb2c

            SHA512

            9a3e9f6eadbfa7a11d2decd30a673cb5bf342c5674fd46bac127b753370f9c52ff77811c7376e7a1b80b9731c51af2023ffbcec40a89e71303be3fb884f4af83

          • C:\~Temp.doc

            Filesize

            30B

            MD5

            e0ae3f9b6f82b008e570cf9d1a4f919e

            SHA1

            1707e4cf4f73f847db48fbc286f43d8b3917d1e9

            SHA256

            0cfd387424a5bc43de7d3b6569046e332904bb839a3a5e362e1a4d8df39a2c51

            SHA512

            f437cdaa491921b27f147272136ca50a4cc8bdce440c363f951b20cb40134a11772e0d4102d12134f9555fdc0dae580ccfda6a2baac17bc99a3cbb7f03a5f92e

          • memory/2700-2-0x000000002FBD1000-0x000000002FBD2000-memory.dmp

            Filesize

            4KB

          • memory/2700-3-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2700-4-0x000000007158D000-0x0000000071598000-memory.dmp

            Filesize

            44KB

          • memory/2700-23-0x000000007158D000-0x0000000071598000-memory.dmp

            Filesize

            44KB

          • memory/2700-43-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2700-44-0x000000007158D000-0x0000000071598000-memory.dmp

            Filesize

            44KB