Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 19:12

General

  • Target

    264ed5263629c35f7ea7a694252b287c_JaffaCakes118.exe

  • Size

    183KB

  • MD5

    264ed5263629c35f7ea7a694252b287c

  • SHA1

    85b4b74baca811a1fb814f1fde1317d342feb0ef

  • SHA256

    6f1acdbd02328bc07734b0a2694275e47b9b50809b6975e65ea97706a2769d91

  • SHA512

    ffff27c43e89c2e44929e6dfb5580cb18354ca1c9b14f23893f2bc2dc4ae3debe9f8e7b974ad12060af4ba2608055d3ca7174ad12d264991497fc0d4e14d4ea2

  • SSDEEP

    3072:i9y3wXjEXhydhmsJLjkN5tZQjr2z1qvYsAGz8CWZKDXdcy66B6RxRrl:ifjU0msJLgZZQjrkqvYsAtZKDXdcy66E

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\264ed5263629c35f7ea7a694252b287c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\264ed5263629c35f7ea7a694252b287c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\264ed5263629c35f7ea7a694252b287c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\264ed5263629c35f7ea7a694252b287c_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab2ADA.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • memory/1716-0-0x0000000074B61000-0x0000000074B62000-memory.dmp

          Filesize

          4KB

        • memory/1716-1-0x0000000074B60000-0x000000007510B000-memory.dmp

          Filesize

          5.7MB

        • memory/1716-35-0x0000000074B60000-0x000000007510B000-memory.dmp

          Filesize

          5.7MB

        • memory/2664-30-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2664-34-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-26-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-24-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-22-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-21-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-20-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2664-28-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB