Analysis

  • max time kernel
    140s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 12:31

General

  • Target

    3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe

  • Size

    448KB

  • MD5

    3a1f9cc03ce9cf1e7606cc1c7b28bee2

  • SHA1

    cda00a090fff93ebdaf68fe6edcabc73c0b263aa

  • SHA256

    20f11c3ca5a849e1fe429be57d11ed6f3c07a1c1429b676435603bbf4f6be759

  • SHA512

    1dc2de0271d1b2665f385d3590734c345ce1aee75ccfbf6831421c4d0528b56f569700b8723b0dc2f81dfe67432b60f17d8b113c59c8f5aad7f1bf627866e130

  • SSDEEP

    6144:UOeTIfnjAEkxJPNeaL9uRqQb3fgnFwFGLgJ2k0SyCKF1pYax6uYj+LJYek:LAEOJPNeapQrgjLgJoSyCuDYax6hjsk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a1f9cc03ce9cf1e7606cc1c7b28bee2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\mmgzatlzfbptgh.exe
      "C:\Users\Admin\AppData\Local\Temp\mmgzatlzfbptgh.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\parent.txt

    Filesize

    448KB

    MD5

    3a1f9cc03ce9cf1e7606cc1c7b28bee2

    SHA1

    cda00a090fff93ebdaf68fe6edcabc73c0b263aa

    SHA256

    20f11c3ca5a849e1fe429be57d11ed6f3c07a1c1429b676435603bbf4f6be759

    SHA512

    1dc2de0271d1b2665f385d3590734c345ce1aee75ccfbf6831421c4d0528b56f569700b8723b0dc2f81dfe67432b60f17d8b113c59c8f5aad7f1bf627866e130

  • \Users\Admin\AppData\Local\Temp\mmgzatlzfbptgh.exe

    Filesize

    6KB

    MD5

    371c1df899f9b148a09e3c6f58c37793

    SHA1

    8b1474046cc97229823e05689d8c018a1c03b5fd

    SHA256

    5a3fc1727ee82d48de48f43762c3879781b64cf44eab01342bbfe5de68478877

    SHA512

    73f4b4950d23370ec1db614d056c085303de39125fb95c384554e0e7a141ffb0786de746f272263f1472d093c44000323e2f5ca5bd0195b4468a2e436fcce8b9

  • memory/2908-7-0x0000000000CE0000-0x0000000000D24000-memory.dmp

    Filesize

    272KB

  • memory/2908-16-0x0000000020A30000-0x00000000211D6000-memory.dmp

    Filesize

    7.6MB