Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 16:23

General

  • Target

    7d9ca93506866a8444e0fa51dedf88e7_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    7d9ca93506866a8444e0fa51dedf88e7

  • SHA1

    d0c175de02d51778eb7063a40f448a6035ff0890

  • SHA256

    53686b47fcbcbd0dcd44d4f305098398e944e1eb5b594d7e792be7ad8fe80599

  • SHA512

    5e6484085e379cc9f31337cdb13ffd4cc68962a092594ace57373c274dc978341fb918c3f11e28ea50b622913b31355bcfd4fe22f5ff10bec67521b8c04189f6

  • SSDEEP

    12288:uuklkMVqd1t8jEIoCTaPG0j4DeuH5GyAw64vYr1IZq6T7UNU7hm92J6Gz1VwFAHe:u3jl2WzbZL6gEAqEVmA7x6FAnc

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d9ca93506866a8444e0fa51dedf88e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7d9ca93506866a8444e0fa51dedf88e7_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\7d9ca93506866a8444e0fa51dedf88e7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\7d9ca93506866a8444e0fa51dedf88e7_JaffaCakes118.exe" Track="0001001000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 2068
        3⤵
        • Program crash
        PID:3100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 2028
        3⤵
        • Program crash
        PID:1464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 820 -ip 820
    1⤵
      PID:4328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 820 -ip 820
      1⤵
        PID:4532
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4412 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:620

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/820-0-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-1-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-2-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-3-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-4-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-5-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-6-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB

        • memory/820-7-0x0000000000400000-0x0000000000522000-memory.dmp

          Filesize

          1.1MB