Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 23:37

General

  • Target

    a2f5d997b445d02e5be962f7876e708f_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    a2f5d997b445d02e5be962f7876e708f

  • SHA1

    f2d20b9768c289c784cfd4dec256f4d703870396

  • SHA256

    27ac85c53e531e10a0c11d152491a95dba7d9734ce153f5624cbf5c9ca5e6465

  • SHA512

    68118bbabc4ea4ad823d48d21ed58258ed4caff26299842be13843d1c295b7eb01be96be38fcfc6832b28b2de03ebbac22a3d381ca6016fad9fd97e8bfa5a953

  • SSDEEP

    768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHbOYB:aqk/Zdic/qjh8w19JDHxB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2f5d997b445d02e5be962f7876e708f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2f5d997b445d02e5be962f7876e708f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c3579456069f96b290d19a56d67bd96

    SHA1

    14584b4c245e795bc2e0a5e0b996951315a1d9c2

    SHA256

    463f4a461343ac369c923745d69b66e77216f3d979a6c01ff5c20521694f8a46

    SHA512

    299deb1c21ee1137aa778c2e47af516ad1c80dfb023cc03abc0c3347e1a6b496a6ea930c69ef02a58930cc3c7af05ed3ef84db8a5b6785904713d8e3902b9eda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a6d575ff03df3044a51e7074f95c214

    SHA1

    7a6389037e9a15d01b05493d4856eaac391e68d4

    SHA256

    7bbf7913b46b1d3eb10613688ea37aad8adf99fe0103f1f8c50eb92fba8d6637

    SHA512

    4af56930833a879bec75e6f131dac0367d3711ffbdcc2d01c9cb66f352cf02467fd6bb4b264b402f0bd98d6916788a614b74aaf071c78437713a62477c07fdee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6468908df4d546837522e780c4208919

    SHA1

    e8fcd447a154fa532f7855826a8c1035dcd7e088

    SHA256

    85a32ee2aef6345709a75ca75fe3093149932f7dba4096f072d0c4793f9d5cff

    SHA512

    9189ba5e1f8e39f7cce008cc396d5b137da00e273ce5746642026a1604c077e6a1eec2be320ed3c9ace55d272284e6c14ec058ff23f39cc8a36ee5ad53666617

  • C:\Users\Admin\AppData\Local\Temp\Cab6284.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6313.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp6116.tmp

    Filesize

    40KB

    MD5

    20f3b78cb9da2409d1209ee23a0eb21f

    SHA1

    d53080b47832bd40a921bb7f5f4880ad08d29de9

    SHA256

    f049de72e7a80afd15ec983aa4d9fbee34a25b042ba491cafe6ff467bf28f8e0

    SHA512

    8edb9a8d5470b742c16e2d809c0b9a8d8b1f5848788df34de76e9352df6cade245b7283713276c759aaa19d3aad7b1db165e6fc03b1ee78cb88c92f5abd5947a

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    d49ce0b0dafdf1e1f3117037176a685b

    SHA1

    0e59fb151e1dcac8f289b64d29d2d81038793c42

    SHA256

    1bfd7603b705d8fc746292668cb3faa580d195201414fe818a572863209d6961

    SHA512

    3ee91e8ee3d1d65dcff90a2ac6d0ea0959a5334494cbc2eb961dca900f662adeb286d9112c495a804befda980e411625494d9c0934a8dffff907f16e134b8384

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    2c067334f37fd2b18f87555258b6f2fc

    SHA1

    624cfa2703aa887eb9ac3e2d0e8751cb05195203

    SHA256

    26f2387f76c818663a0224f9ed09b31b3397c9a0fcd5445c96341f7ba081bba9

    SHA512

    24648b4aee3619c3368ac98e08500a9a2f3e222d025c4e4f8d603f0fc18e6284408e85d80bffcfff5434695e84c01f5865ecc0451329244a7af16760ddf9d453

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/236-0-0x0000000000500000-0x000000000050D000-memory.dmp

    Filesize

    52KB

  • memory/236-8-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/236-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/236-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-67-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-35-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-57-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-58-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-27-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2024-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB