Analysis

  • max time kernel
    136s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 12:34

General

  • Target

    71f763464004d37a427c878b1644ce88_JaffaCakes118.exe

  • Size

    98KB

  • MD5

    71f763464004d37a427c878b1644ce88

  • SHA1

    a3a1a805e898e134c34d76c8760442868f187ea4

  • SHA256

    11c6adae45ef678e3a323a51eba76d295cc7f2bed96de44e2498b51cfea63528

  • SHA512

    b465ea624e761d3f49d04135c247c84c8f5c830f5e0b22de943a790d8e7e1cb2225079cf53e65b554f5844d22650723c560c045b6ac27159cb1023fade678f4e

  • SSDEEP

    1536:dQpQ5EP0ijnRTXJC7NeYRNgKJ+BCyrC2IsMQjxK8WjAIECZcN:dQIURTXJ8eqgKJ+BCAC2IJEXWUYZy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71f763464004d37a427c878b1644ce88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\71f763464004d37a427c878b1644ce88_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Local\Temp\nseE9B6.tmp\downloadmr.exe
      C:\Users\Admin\AppData\Local\Temp\nseE9B6.tmp\downloadmr.exe /es124912
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1460
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1032,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=4168 /prefetch:8
    1⤵
      PID:4788

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nseE9B6.tmp\downloadmr.exe

            Filesize

            88KB

            MD5

            c20412a0c9d47656f9f97aa5cb7812cb

            SHA1

            8b55384408e93184b098559084a7746e1ab77036

            SHA256

            ef757b82a1db0330051d6e16468ad1e906bff88e29d919f3939742a98da87c8d

            SHA512

            6630ecb5bec345ac08c989d5bfaa2d718ebf89adddae34dcd4e0353668f8aff0f3d068b7bad5117a631420c8a32ebccfe9f228dd8e4b2561cbe9e947e23fbef0

          • memory/1460-4-0x0000000073DD2000-0x0000000073DD3000-memory.dmp

            Filesize

            4KB

          • memory/1460-5-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-6-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-17-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-18-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-19-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-20-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-21-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-22-0x0000000073DD2000-0x0000000073DD3000-memory.dmp

            Filesize

            4KB

          • memory/1460-23-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-24-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-25-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB

          • memory/1460-26-0x0000000073DD0000-0x0000000074381000-memory.dmp

            Filesize

            5.7MB