Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 17:08

General

  • Target

    ffc296ece9c7d167e5a6aaae08ba7daa_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    ffc296ece9c7d167e5a6aaae08ba7daa

  • SHA1

    f4091ec6d32187b298bf61af18954c89057b0d17

  • SHA256

    9a4b827c09b059e63da6c93e30563fbe0a5984bd8eac94cf1dd760611d308dfc

  • SHA512

    819c5c92b80eab1654bba4d2b3eb72b98be6a3f12c42ebff21f98972f39cb1600c14e790689c92030667c86a03fbe329e3fb696b40960672ec68f6a8086c27c0

  • SSDEEP

    1536:xET64WKch3dQzOwtwSI3yHBUJu5OXIvzpjIp/n:xq64Wx3dmqSSyHBknGzpjA/n

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffc296ece9c7d167e5a6aaae08ba7daa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffc296ece9c7d167e5a6aaae08ba7daa_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gpj..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Gpj..bat

          Filesize

          238B

          MD5

          9e359267af4d74bb71f99655705fa9c6

          SHA1

          3ff9b5f4d6ad956898ac26aa850c0fdc82885789

          SHA256

          4806d76432281a7100b9734fb41821f63be12df9e9d5deb7fe53a997e08d0071

          SHA512

          42770555c8a35d545b09ff4e5f7f598e066c151ab8c0a6487bc86fe96735b85b962b0172f64aad7402e19b273982fcea73fd8259589755bacb3cbcdafccf441a

        • memory/2364-0-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2364-2-0x0000000000250000-0x0000000000268000-memory.dmp

          Filesize

          96KB

        • memory/2364-3-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2364-4-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2364-5-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2364-7-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB