Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 10:42

General

  • Target

    78e2a20a8f97b89571bf40d8c9b765c7_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    78e2a20a8f97b89571bf40d8c9b765c7

  • SHA1

    5a749856141a7d2e2e3db4e60b2e6b9bc251ac50

  • SHA256

    c36ce330043bcc52945bab979df41750ade076a409507a80c96de5df7a7803d9

  • SHA512

    d8206540fc5913d64cd534aba87bb8bd4b23eab0cbd36ba5e6ec356d1e8257549d5c66bd428d8c4758451093dda5a25beb422094610351f2e053192604d6a8bc

  • SSDEEP

    6144:DV24jwRTGLyog2fsAu6i6xgB1A/W1Z0fu96euNY45:DV2mwRTyyog2fsz6xgBumU5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78e2a20a8f97b89571bf40d8c9b765c7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78e2a20a8f97b89571bf40d8c9b765c7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\bhs1140.tmp

          Filesize

          242KB

          MD5

          f6cb534a58dcc29446b518fd294e82ad

          SHA1

          797935cd7ab355a55efa733fe8d7aadd09167d4b

          SHA256

          e7060cc8801db67b198e276e6f92355137ea3afd39797bf6b973b0bc822828df

          SHA512

          30738a097c8c9eecd0fc27b3d02796e5c9400bf7214710e57d932348bfe4752ce80dd6bd0d24c254b3032226bd017b7201a920d8a5b02e37d61a38c171bf28cb

        • memory/2348-7-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-3-0x0000000000310000-0x0000000000352000-memory.dmp

          Filesize

          264KB

        • memory/2348-4-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-5-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-6-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-0-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

          Filesize

          4KB

        • memory/2348-13-0x000000000B260000-0x000000000BA06000-memory.dmp

          Filesize

          7.6MB

        • memory/2348-18-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

          Filesize

          4KB

        • memory/2348-19-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-20-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-21-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB

        • memory/2348-22-0x0000000074A70000-0x000000007515E000-memory.dmp

          Filesize

          6.9MB