Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 02:13

General

  • Target

    022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    022ef8c1dffca4f9ead73c61a265098f

  • SHA1

    7a69d40e89da599562d3164eeb5818a6aa235062

  • SHA256

    816f990ed599ecc42d99b35e8aa05bba467dddeaa40fd7e68decc330d8224211

  • SHA512

    5a6255e15cfc9211d9f9e30d79aba59a63b3d96f3f8e5c6e282152fa2231d7d254c960fa2dbecbda9bbec65b3bd2b702e558aa0b2a76825f7046d734e94c8274

  • SSDEEP

    3072:MexEryQ5wXtfVYPS0FLx/q4z+5JvpgP9A+7q0G56gL86jltjWZvVqs:FxPYFL5q4ggP96a6jzjqvU

Score
10/10

Malware Config

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\022ef8c1dffca4f9ead73c61a265098f_JaffaCakes118.exe"
          4⤵
          • Suspicious behavior: RenamesItself
          PID:3000
  • C:\Windows\SysWOW64\mgmtagent.exe
    C:\Windows\SysWOW64\mgmtagent.exe
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\mgmtagent.exe
      C:\Windows\SysWOW64\mgmtagent.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\mgmtagent.exe
        "C:\Windows\SysWOW64\mgmtagent.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\mgmtagent.exe
          "C:\Windows\SysWOW64\mgmtagent.exe"
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:2892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/940-5-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/940-3-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/940-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1824-4-0x0000000000490000-0x0000000000590000-memory.dmp

          Filesize

          1024KB

        • memory/2028-10-0x0000000000434000-0x0000000000440000-memory.dmp

          Filesize

          48KB

        • memory/2700-15-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/2740-22-0x00000000004B4000-0x00000000004C0000-memory.dmp

          Filesize

          48KB

        • memory/2760-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2892-23-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3000-17-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3000-16-0x0000000003000000-0x0000000003037000-memory.dmp

          Filesize

          220KB