Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 13:38

General

  • Target

    0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe

  • Size

    994KB

  • MD5

    0beedf0af80e94f5302f607cb2f6975d

  • SHA1

    d057098b5cfdf7317f81a5049e4996fdb038c2cf

  • SHA256

    9af7a38f538f74cda293228f4a82897eda192ba2218f14e528d01aa434eb8ca0

  • SHA512

    3d09cf6d22d3c80f7a1dd67649278029151eca8b5632fe99d1fce3f8f0b1bf4e085a7895c30f23368511aa71ece354e778d941ba2fd9a9875aef4bd21f72f6f6

  • SSDEEP

    24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxG:dJ5gEKNikf3hBfUiWxG

Score
10/10

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    994KB

    MD5

    e871af4e2a464731760b2e012874a263

    SHA1

    9211e2ac2a127c2339a0bee10f16968d6b9c9b51

    SHA256

    622a7b25f3d8d11c859de0680e5db6029ad6d97bd37bd22643b0e386a2dc59d5

    SHA512

    54116428de831a2251d7bd73f98bdca645546f9668a763b5cfc8f982f784139896713846c885ec45f346468746be7989c1e0df5714fcf15aa99da396aa71d187

  • memory/2372-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2372-2-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/2372-3-0x0000000002AA0000-0x0000000002EA0000-memory.dmp

    Filesize

    4.0MB

  • memory/2372-6-0x0000000003220000-0x000000000322A000-memory.dmp

    Filesize

    40KB

  • memory/2372-10-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2968-13-0x0000000002B30000-0x0000000002F30000-memory.dmp

    Filesize

    4.0MB

  • memory/2968-12-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2968-14-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB