Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 07:31

General

  • Target

    667a74fbff84c6e31dc2600edc5ca274_JaffaCakes118.exe

  • Size

    875KB

  • MD5

    667a74fbff84c6e31dc2600edc5ca274

  • SHA1

    0bb3cc777608148246caf13a589e6c87ccdebfb6

  • SHA256

    780d5ac517c7ae3eb4bb76781c563a22c9802f7ba3483e50dc47eb7689f70f37

  • SHA512

    77b692d4b184e782bfcb922f5a5d77c0f0a632fc4335c744e31b911cd2b0162ce036d3feddef72c038146f9ff7363fd8f8aaa00ae2ff9092e6b9bed17968f35a

  • SSDEEP

    24576:JbdxEOixB/E2u1XZG0/X6lTc8DSDWjon4s:JbPEOix5Hu1A0/6PSD6o4s

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\667a74fbff84c6e31dc2600edc5ca274_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\667a74fbff84c6e31dc2600edc5ca274_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-10-0x00000000009F0000-0x0000000000B35000-memory.dmp

    Filesize

    1.3MB

  • memory/2168-9-0x00000000009F0000-0x0000000000B35000-memory.dmp

    Filesize

    1.3MB

  • memory/2168-2-0x00000000009F0000-0x0000000000B35000-memory.dmp

    Filesize

    1.3MB

  • memory/2168-11-0x00000000009F0000-0x0000000000B35000-memory.dmp

    Filesize

    1.3MB

  • memory/2168-13-0x0000000000410000-0x0000000000411000-memory.dmp

    Filesize

    4KB