Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:41

General

  • Target

    658f5d8ecbee9a76c9b5493db9242edd_JaffaCakes118.exe

  • Size

    903KB

  • MD5

    658f5d8ecbee9a76c9b5493db9242edd

  • SHA1

    afd6fd4308d9f8a4352e59468a38e75e468b8e01

  • SHA256

    515debc529ea5689a3f64e34cd1d05d1502783b006ab03b17050eac5a6c94aa1

  • SHA512

    bf0ae32b25055f04cf0265d5007aa922dad9acbbede091f3a485207c7f01107023ecc1fd3aa577bbfab75d910a0f9ca0bedf02015990b83a71ce34b641b34436

  • SSDEEP

    24576:aVtd0O34AianOM/UQ2MKX6GevJYIlDB/LGEnwX:aVtdj1vnKQ2Mq6VYIDtwX

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\658f5d8ecbee9a76c9b5493db9242edd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\658f5d8ecbee9a76c9b5493db9242edd_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1968-3-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1968-2-0x0000000000170000-0x0000000000175000-memory.dmp

    Filesize

    20KB

  • memory/1968-4-0x00000000021E0000-0x0000000002310000-memory.dmp

    Filesize

    1.2MB

  • memory/1968-11-0x0000000000810000-0x0000000000811000-memory.dmp

    Filesize

    4KB

  • memory/1968-13-0x0000000000830000-0x0000000000831000-memory.dmp

    Filesize

    4KB

  • memory/1968-12-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1968-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/1968-17-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1968-16-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1968-21-0x0000000000830000-0x0000000000831000-memory.dmp

    Filesize

    4KB