Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 19:03

General

  • Target

    214cbc9a8eb253b6795fcd6e0c07dbdd_JaffaCakes118.exe

  • Size

    283KB

  • MD5

    214cbc9a8eb253b6795fcd6e0c07dbdd

  • SHA1

    904bc3a63683dfa5199d908133a50da505b5312c

  • SHA256

    1f3f92882e077867b88c98bd65f1fb59a5cbc61977cf4fc24bcdd6859a2831e7

  • SHA512

    c2dc6969269d726783bcb3a12999e6e4524410db5ff67dba09b0e5478226b42d94ad42f54442354517558ed27adb49c5885027b7284bdd45a888c25ba04bef77

  • SSDEEP

    6144:Pw6JOerGp2aPeiyx+/Hqyo3ia/keIJSkH364n8LQTj3Fv0B2fJLYl:PwurYPex+/2rXI5XxBj3GMfI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\214cbc9a8eb253b6795fcd6e0c07dbdd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\214cbc9a8eb253b6795fcd6e0c07dbdd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\dfs12C6.tmp

    Filesize

    496KB

    MD5

    93fde31f598bbfb7b0822648d4a83889

    SHA1

    9b7194bbdcee2ed5ee95769a79e44dcb1c848944

    SHA256

    2bcf933a8542f0df471a459e3a37408c1209fbe367bcd738e7d7a1700a36f983

    SHA512

    ee6ba0aafe8b2830ff5f8986be652f097f65632252abd55abefa4fd2e4269afdd62387ea5faff110da77463418b2e4406d5a3dc1ac7c884b7f676bff4b4e07cf

  • memory/1740-11-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-23-0x0000000000D10000-0x0000000000DCA000-memory.dmp

    Filesize

    744KB

  • memory/1740-7-0x0000000000930000-0x00000000009B2000-memory.dmp

    Filesize

    520KB

  • memory/1740-9-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-3-0x00000000744FE000-0x00000000744FF000-memory.dmp

    Filesize

    4KB

  • memory/1740-0-0x0000000000D10000-0x0000000000DCA000-memory.dmp

    Filesize

    744KB

  • memory/1740-8-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB

  • memory/1740-12-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-10-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-15-0x000000000AAC0000-0x000000000B266000-memory.dmp

    Filesize

    7.6MB

  • memory/1740-1-0x0000000000080000-0x0000000000083000-memory.dmp

    Filesize

    12KB

  • memory/1740-24-0x00000000744FE000-0x00000000744FF000-memory.dmp

    Filesize

    4KB

  • memory/1740-25-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-26-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-28-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB