Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 20:08

General

  • Target

    6fb2146a6ec0ccc505d52e9e02f9cb38_JaffaCakes118.exe

  • Size

    459KB

  • MD5

    6fb2146a6ec0ccc505d52e9e02f9cb38

  • SHA1

    2f7eefe21dcd3290c22488ccfb810e66a9825ed9

  • SHA256

    f3f360bc9e14930c4bbe7a0271eaeb718028f143e4c609f03fc02afe4e068cf7

  • SHA512

    8b25d6791ad7c9bf573ee6b41e8101afb0c2e5b1130b9d4637c2ea6214188e2cf7188517093ddc290262903d25b624e6e046ef63ab23d6f58b0968b8509c3e0a

  • SSDEEP

    6144:cwDYXpUeM68MJgyA6is7pcjisAfwf79ANeKnUjA8tXkk2pHPRjF0C3fYN:8M6LJgy3itQwz9PKnsA8kkCPRjNK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fb2146a6ec0ccc505d52e9e02f9cb38_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6fb2146a6ec0ccc505d52e9e02f9cb38_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\worker.exe
      "C:\Users\Admin\AppData\Local\Temp\\worker.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\parent.txt

    Filesize

    459KB

    MD5

    6fb2146a6ec0ccc505d52e9e02f9cb38

    SHA1

    2f7eefe21dcd3290c22488ccfb810e66a9825ed9

    SHA256

    f3f360bc9e14930c4bbe7a0271eaeb718028f143e4c609f03fc02afe4e068cf7

    SHA512

    8b25d6791ad7c9bf573ee6b41e8101afb0c2e5b1130b9d4637c2ea6214188e2cf7188517093ddc290262903d25b624e6e046ef63ab23d6f58b0968b8509c3e0a

  • \Users\Admin\AppData\Local\Temp\worker.exe

    Filesize

    7KB

    MD5

    07ad28f3d9e5a5b0dbaa10a5c45d37c7

    SHA1

    a1a61f298d6f62de1808b622275b3e34ad54d855

    SHA256

    ae955e71be37ed8c82a9add05ce70638ba9c350128d87ac9c63de3ee81804db5

    SHA512

    91bd41196bb60e3db7d25dc2da22c4e9791946755ec4e9beb535d34d0265cc19c3eb9cf628b218292331237eaed3a74e6ca508026b6160621dff2f093a34bebe

  • memory/2012-15-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-10-0x0000000000C70000-0x0000000000CB4000-memory.dmp

    Filesize

    272KB

  • memory/2012-13-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-14-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-8-0x000007FEF573E000-0x000007FEF573F000-memory.dmp

    Filesize

    4KB

  • memory/2012-16-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-17-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-24-0x0000000021370000-0x0000000021B16000-memory.dmp

    Filesize

    7.6MB

  • memory/2012-29-0x000007FEF573E000-0x000007FEF573F000-memory.dmp

    Filesize

    4KB

  • memory/2012-30-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-31-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-32-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB