Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 10:20

General

  • Target

    a50d94298e9ef54315c57d96d68ffd83_JaffaCakes118.exe

  • Size

    681KB

  • MD5

    a50d94298e9ef54315c57d96d68ffd83

  • SHA1

    d9febb4bddd281c9e53e5b9c4c73251f2be7908c

  • SHA256

    130dab330b434d30c8d6bac515176cdfb571e60ca3f9e06705e1f2a3d2e3bf04

  • SHA512

    8d12af188f8d7a588beb8cbc5411815c8d131e56929f346c02314cc98539b889a26b2a56db3911a0eb19723dc2699c4ab28e6cf4446d5ec6c0cd0f7acca1e3c6

  • SSDEEP

    12288:rwEZxZLDznQwo5unUeArTE5yjgcy7LxOuH9/7HPuXRZ8dzfPtfdeEvnrvdXZPThe:cEZxZLHnQwOunXLpvwuVbKz81VfTFXZw

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a50d94298e9ef54315c57d96d68ffd83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a50d94298e9ef54315c57d96d68ffd83_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetWindowsHookEx
    PID:3616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 2168
      2⤵
      • Program crash
      PID:2284
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 2204
      2⤵
      • Program crash
      PID:4528
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3616 -ip 3616
    1⤵
      PID:4772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3616 -ip 3616
      1⤵
        PID:5048

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3616-0-0x0000000000400000-0x00000000005CC000-memory.dmp

              Filesize

              1.8MB

            • memory/3616-1-0x0000000000400000-0x00000000005CC000-memory.dmp

              Filesize

              1.8MB

            • memory/3616-3-0x0000000000400000-0x00000000005CC000-memory.dmp

              Filesize

              1.8MB