Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 17:53

General

  • Target

    54364ec3491ca86f85d8a4063a2c8756.jaffacakes118.exe

  • Size

    103KB

  • MD5

    54364ec3491ca86f85d8a4063a2c8756

  • SHA1

    079093cd6d2e42673991c5bb901d6269bd2e418c

  • SHA256

    cbf9f89f26c6ddb1669d1909e771588b1683b8169fccbc5b6e77c538bb8ae5d1

  • SHA512

    ed94daf0ee5b17de6e801fb1695b95769d7408a363be7cf03810639a9ffd313e5aa767da3e52962f512e78c272ab7b252bd0fcba7b4244aeeaabb6329af155e7

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfw:hfAIuZAIuYSMjoqtMHfhfw

Score
9/10

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54364ec3491ca86f85d8a4063a2c8756.jaffacakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\54364ec3491ca86f85d8a4063a2c8756.jaffacakes118.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    798b58c10a8bc82f8a80a679f624fa12

    SHA1

    4215015f047f281ba96eb2488b54637150ecc9f6

    SHA256

    a5b8324a54ccffb330ce6305b5fb7369b4604427150678a2714cd546d3209e79

    SHA512

    7776bfbb2edafe4d5d8f83d2994710abf291e81d3401ccdd7c7d047317792a9b405677a384ae0b2a042752885f7314346c0a4e253a169119441b36e8ff76cb66

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    112KB

    MD5

    b285914e274915db52c4fd5b7d349738

    SHA1

    7165e28c40ead0a8b33516df9d2faed3fef3548c

    SHA256

    c0e0acce1e31459db0b427a871750a805e4553d5d2ef3f9dcd6f75091efff122

    SHA512

    66a34d1468801f4eaf5d1fe0fc44c636c5b8a71b3d62a8709eec711263c7150ebc54aa0aaf03eb866b450f70bf42b78ec5675d3567ede3934be934c98b02d094

  • memory/1620-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1620-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB