Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 10:56

General

  • Target

    fc9a0ef432cf49b3d6084e8e34439dd2_JaffaCakes118.exe

  • Size

    368KB

  • MD5

    fc9a0ef432cf49b3d6084e8e34439dd2

  • SHA1

    db75d09d6996dc67b5c3e351048e6bb879868bb1

  • SHA256

    5836279a50c920b02adb82275758a0a797ad8215533eb16839c05302faf4dbde

  • SHA512

    73d12daf3dc37d7fd3595d53874d6d3bfe98828c4f1720ef340cd73dc54e44bd679dc85aeb48776977dd471ec2a82578a1d7a5b2654a818e74feee86bd06410a

  • SSDEEP

    6144:vQ76VsQddciR7Qlf7fZ4fObHg4PTASpA1OFxB0E/guiHTTvKdwY7u73AEAPnvQtk:vQ7n+d5Ql9t9PTNpA1mV/snKeI6AzP4D

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc9a0ef432cf49b3d6084e8e34439dd2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc9a0ef432cf49b3d6084e8e34439dd2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 796
      2⤵
      • Program crash
      PID:2860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 804
      2⤵
      • Program crash
      PID:1044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 844
      2⤵
      • Program crash
      PID:5068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 812
      2⤵
      • Program crash
      PID:2352
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1160
      2⤵
      • Program crash
      PID:3608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4772 -ip 4772
    1⤵
      PID:3152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4772 -ip 4772
      1⤵
        PID:3328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4772 -ip 4772
        1⤵
          PID:3088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4772 -ip 4772
          1⤵
            PID:4512
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4772 -ip 4772
            1⤵
              PID:5020

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4772-0-0x0000000000400000-0x00000000004C0000-memory.dmp

              Filesize

              768KB

            • memory/4772-1-0x0000000002320000-0x0000000002321000-memory.dmp

              Filesize

              4KB

            • memory/4772-2-0x0000000000400000-0x00000000004C0000-memory.dmp

              Filesize

              768KB

            • memory/4772-3-0x0000000002320000-0x0000000002321000-memory.dmp

              Filesize

              4KB