Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 05:33

General

  • Target

    b1f00efec0d72a781e72d305126ef5b2_JaffaCakes118.exe

  • Size

    382KB

  • MD5

    b1f00efec0d72a781e72d305126ef5b2

  • SHA1

    0222ef1176f6ce203a7546338f932f12b720ca3b

  • SHA256

    56e48a0f936ff66079089d60786d179c202dbbbcd8e4cfb2d5d23152640d2d8b

  • SHA512

    06fa99d5b74dfb2f8b9d3d232a8e7cce4f8c2bc20a9a6bd7aef8e1d8b4a6bb7cc4b231c9f7c535988731c9a99e5265361cccc77db55069d518d7c3a3ae704416

  • SSDEEP

    6144:dMcaGLqwiO3S9O02uD2ZhrHNmGgs3W6kQMLnnGmHbxSYqQ:dwGewiOC9FDKhrRgs3W6kznG0oQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1f00efec0d72a781e72d305126ef5b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b1f00efec0d72a781e72d305126ef5b2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\sad1813.tmp

          Filesize

          271KB

          MD5

          246cb7e3eb62c55cc0ab7810d0304f8d

          SHA1

          fd29cf506675689e5596a48716276aafb0fb94ec

          SHA256

          d6fd5de92ab893cb0355b37792e4f957fdc6e487a5bb4eee82019cdfc50d5356

          SHA512

          97f5933f37b054bf09851566a95bc544f5f86aef854b5347cf1a5ca31707e66ebff574abeee3dd9490d0df78cfd66f61c655c98097a8c88eaf572c8d82dcffea

        • memory/2292-0-0x000000007443E000-0x000000007443F000-memory.dmp

          Filesize

          4KB

        • memory/2292-3-0x0000000000300000-0x0000000000348000-memory.dmp

          Filesize

          288KB

        • memory/2292-4-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB

        • memory/2292-5-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB

        • memory/2292-6-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB

        • memory/2292-7-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB

        • memory/2292-10-0x000000000C780000-0x000000000CF26000-memory.dmp

          Filesize

          7.6MB

        • memory/2292-18-0x000000007443E000-0x000000007443F000-memory.dmp

          Filesize

          4KB

        • memory/2292-19-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB

        • memory/2292-20-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB

        • memory/2292-21-0x0000000074430000-0x0000000074B1E000-memory.dmp

          Filesize

          6.9MB