Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 22:21

General

  • Target

    76fb37d5f05b7cf1ac8d2c1446a08eb4_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    76fb37d5f05b7cf1ac8d2c1446a08eb4

  • SHA1

    8364cfefd9312722956f485b7e13e940b4e11e42

  • SHA256

    c10c762dd123d807d058ea2f3531b00877d24fb9e3aa7bc9abd12410fc996989

  • SHA512

    b37bb5b51344d27f5125e29d3c98a2a78484a7613eec40061dc0c978d9b514385a6c472ebe47817fbc2a65cf2a079a56e9723cd5b4d09a11d3cbb7cac9f0dfbe

  • SSDEEP

    49152:6VOkF9dhcZtCj2sawmjAJwjdxaHMPtSTIaxEk+lCYpT4:JkFOZtCj28mjAGGHWaxU

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76fb37d5f05b7cf1ac8d2c1446a08eb4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76fb37d5f05b7cf1ac8d2c1446a08eb4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 456
      2⤵
      • Program crash
      PID:2912

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2068-0-0x000000000018D000-0x000000000035A000-memory.dmp

          Filesize

          1.8MB

        • memory/2068-1-0x0000000000120000-0x0000000000564000-memory.dmp

          Filesize

          4.3MB

        • memory/2068-11-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/2068-9-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/2068-7-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/2068-6-0x00000000000F0000-0x00000000000F1000-memory.dmp

          Filesize

          4KB

        • memory/2068-4-0x00000000000F0000-0x00000000000F1000-memory.dmp

          Filesize

          4KB

        • memory/2068-2-0x00000000000F0000-0x00000000000F1000-memory.dmp

          Filesize

          4KB

        • memory/2068-12-0x0000000000120000-0x0000000000564000-memory.dmp

          Filesize

          4.3MB

        • memory/2068-15-0x0000000000120000-0x0000000000564000-memory.dmp

          Filesize

          4.3MB

        • memory/2068-16-0x000000000018D000-0x000000000035A000-memory.dmp

          Filesize

          1.8MB

        • memory/2068-17-0x0000000000120000-0x0000000000564000-memory.dmp

          Filesize

          4.3MB