Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 03:49

General

  • Target

    025ab4c4963077f8d112776aed043f67_JaffaCakes118.exe

  • Size

    392KB

  • MD5

    025ab4c4963077f8d112776aed043f67

  • SHA1

    8087be3437dd0f81af440b71c90734abf1f3d47c

  • SHA256

    5abeae3a44c4dddd5a848ee6bf304e42a250ea5dfd0555b501a2618ac4e5e397

  • SHA512

    f03e24aae6a64e685f3fbff68f5f7e7f31a6fa27bf613d2b52cbae20317e176ffc5941c5d308eda2e30af9f5bffeba3d203fc974c8e7784b92a140e31e9dadb3

  • SSDEEP

    6144:Bf5g6C4St7fJHhGkR02XYjmo01+bTzL5TkUYu5:Bq6FSfHhGktXMmo01yLWe5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\025ab4c4963077f8d112776aed043f67_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\025ab4c4963077f8d112776aed043f67_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\jki20BA.tmp

    Filesize

    274KB

    MD5

    c32f6950af257116f34f61ad93a7522d

    SHA1

    2fad5d7030fdaa801f5d7e96200b9376a6df5787

    SHA256

    1fb8cfb6b87549f0a2d3b3b7fcb9289f2bfdaff1583d5003c1a25a07996a7c59

    SHA512

    33396cb4df6f43c398a057c2fb8d5466d33696e275d72ce7a1c3865c3ea8a8a0f649136737d1d211f7b55a641b00129d52311915cc1410ceeecda7207719fff5

  • memory/2844-4-0x0000000000370000-0x00000000003BA000-memory.dmp

    Filesize

    296KB

  • memory/2844-5-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2844-6-0x0000000004D60000-0x0000000004DA0000-memory.dmp

    Filesize

    256KB

  • memory/2844-7-0x0000000004D60000-0x0000000004DA0000-memory.dmp

    Filesize

    256KB

  • memory/2844-8-0x0000000004D60000-0x0000000004DA0000-memory.dmp

    Filesize

    256KB

  • memory/2844-11-0x000000000C820000-0x000000000CFC6000-memory.dmp

    Filesize

    7.6MB

  • memory/2844-19-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2844-20-0x0000000004D60000-0x0000000004DA0000-memory.dmp

    Filesize

    256KB