Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 19:53

General

  • Target

    143d41ca7b94f1efb8ec13a6bfe420ed_JaffaCakes118.exe

  • Size

    845KB

  • MD5

    143d41ca7b94f1efb8ec13a6bfe420ed

  • SHA1

    5044a0accc27700f2ee7bf4494c8775f796083c7

  • SHA256

    40b905971cf41d4c175cdc3ff6bf2d6ef7e40283115f6d601cd345d08de1b360

  • SHA512

    807e0af69fcc3b074ef91a66b46077a1b6b813deeb9e19a5b59a0a99e5a08ed04ad019126b33b5d0a1f3beb7295ecdf2bd6f59f74dd6cc0efdc9f2359386eea0

  • SSDEEP

    24576:j+FOC0R2mA/g29zTLcyJJEotnVQRvJiOL2dSNquTJiT:j+FOC0R2m32TIYdtVQRvJi25Iu4T

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\143d41ca7b94f1efb8ec13a6bfe420ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\143d41ca7b94f1efb8ec13a6bfe420ed_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-2-0x0000000000C30000-0x0000000000DB4000-memory.dmp

    Filesize

    1.5MB

  • memory/2180-9-0x0000000000C30000-0x0000000000DB4000-memory.dmp

    Filesize

    1.5MB

  • memory/2180-11-0x0000000000C30000-0x0000000000DB4000-memory.dmp

    Filesize

    1.5MB

  • memory/2180-10-0x0000000000C30000-0x0000000000DB4000-memory.dmp

    Filesize

    1.5MB

  • memory/2180-12-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB