Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 16:14

General

  • Target

    63eba9fddbe18dfe88428445c546576b_JaffaCakes118.exe

  • Size

    325KB

  • MD5

    63eba9fddbe18dfe88428445c546576b

  • SHA1

    090dcf2222df2867ad27207f0c7774027cfc78df

  • SHA256

    9f4ba63d625edf65126578e7eeae7a338633038750ed96088d6f6e53b6a21c5b

  • SHA512

    797efa45b7ffff16079edcc45a6dc926fac31ffa9da6420a79a87c2cdace92daccf59849145c3ae3cc50928c31a670abb805e0452f32458cdcaa84a8dc57b3ea

  • SSDEEP

    6144:qrl8sf608N/cz9GD0mOh3Jhh9Ha24RYEq:yl8sC08N89StOh4lq

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63eba9fddbe18dfe88428445c546576b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63eba9fddbe18dfe88428445c546576b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bhs8E6A.tmp

    Filesize

    241KB

    MD5

    d70cbeebf027958b345d7a8c5f58bae9

    SHA1

    9e98d6fcb9e4a5119cf345e752f38ab013094775

    SHA256

    a41a9fefe9b545590af058111930503ec52babc6c8e22b856810dbe980a37359

    SHA512

    88a50f0a3edfb99b18089cb3f3f6e03ce6cbd164f6ad19405fde82aca18c62af617509e31ded26ae58f19cacb950b139443fabbfb179e43681845ad85f2b3d35

  • memory/1932-0-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

    Filesize

    4KB

  • memory/1932-3-0x00000000003C0000-0x0000000000402000-memory.dmp

    Filesize

    264KB

  • memory/1932-4-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-5-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-6-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-7-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-10-0x000000000A650000-0x000000000ADF6000-memory.dmp

    Filesize

    7.6MB

  • memory/1932-18-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

    Filesize

    4KB

  • memory/1932-19-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-20-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-21-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB