Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 03:16

General

  • Target

    65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe

  • Size

    369KB

  • MD5

    65d27697e295e256cdd137bb1eea6554

  • SHA1

    d5b4c6534d317953199027083ad1fac8838b7501

  • SHA256

    c698526d47dd4937aa1ae15f13428587ea5a5053040abeaf0a5dda5f39567542

  • SHA512

    96f393bbe6fc8901a12d8cd21fe4d47d42e40a83588ff19294a2e84b85ce1acf81aaf040477a90fccc4b587a8d8225466281154dd902f7e59676deb8feac201d

  • SSDEEP

    6144:R7Cd4ktZcqUcV/CfeAyi9QDypSmvgLainMCa2crbwwmrlVrlJM1:R7CdVtZcqUM/CfeAyiKGOa2ycwOHrzC

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4428

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Smilebox\smilebox.log
    Filesize

    314B

    MD5

    6b1b5faf2fa2e8cc8e8521ba2aa15356

    SHA1

    d4313936736b77ed76ab1cb7e3d377bfdca3304e

    SHA256

    df29cd5ffd836714276496604469f5342bff30d493768743b9286790006db606

    SHA512

    d73027ece42c76e9db68e95149f8a3af92aea67e4be3c6ae25289abca9609dd35270131e192b24eac5bb60245d6dbae6da9e759b40cc968e08cb98cc69e64a18

  • memory/4428-0-0x0000000002ED0000-0x0000000002ED1000-memory.dmp
    Filesize

    4KB