Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 10:28

General

  • Target

    ff12def2638a14e987d8edbf0d393cfb_JaffaCakes118.exe

  • Size

    175KB

  • MD5

    ff12def2638a14e987d8edbf0d393cfb

  • SHA1

    09050c91cc6a18288b3ad40316f04b6576e692fe

  • SHA256

    c5ddae0579ce6e79981ac405c04a6ef2a8e52bf277fba55ebd2e21bde8a5a007

  • SHA512

    d030a8ca9cc11ff68035fb7d076ff6f04c34a7a1583130c4c642f9b68bcceeb11d347b1f4ccbe718bed3408e6d4a29a02bd3dbbd6d7d33e3b3ff3e97085b5759

  • SSDEEP

    3072:RYxc0FG6888j58TYoA8PqzHXnrpvCI/F5Ih02GEocKyz6KiULcME9sDvqjJ:RWC+PA8PqzHXwIzI62GEtKG8469r

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff12def2638a14e987d8edbf0d393cfb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff12def2638a14e987d8edbf0d393cfb_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1684-0-0x00000000022B0000-0x00000000022C2000-memory.dmp

          Filesize

          72KB

        • memory/1684-1-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1684-54316-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1684-54319-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1684-54320-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1684-54321-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB