Analysis

  • max time kernel
    148s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 00:44

General

  • Target

    017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    017f249f7f50947ca4fe9d6765544561

  • SHA1

    d4ec1bceca0865236638ddc62b6f1d230958107a

  • SHA256

    72c6bb6a226f32a39ace5d7fdcb6ad2a4082eea2b0af993761f69c2789504743

  • SHA512

    84b45a67f5552d022d28fe853611123949955fe7abb836554d90ba8cf2b0aa45bb14e2017cb12a47cf6e3af34ea420da0d30f5e160e39b405c4c564578756d78

  • SSDEEP

    24576:YWpDu4Aw/eQ7VE8DOY5tSToOTepRSipNhvj1uj6g9eCwl5uRDFp1:PQVQREnHB8Si/hvc9Gnujp1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\is-KB7E8.tmp\is-UTC74.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KB7E8.tmp\is-UTC74.tmp" /SL4 $800EA C:\Users\Admin\AppData\Local\Temp\017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe 1109755 51200
      2⤵
      • Executes dropped EXE
      PID:2816
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4100,i,14221647728265121051,6840906015709541562,262144 --variations-seed-version --mojo-platform-channel-handle=3960 /prefetch:8
    1⤵
      PID:2112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-KB7E8.tmp\is-UTC74.tmp

      Filesize

      606KB

      MD5

      a786351eeeeb9a29aaeec83417a70802

      SHA1

      17464f0512ce1a42d8f00b463eff6ee4663b81dd

      SHA256

      dc48b8861dffcf9a5979a8296a7d798a01997ad19ae9bba31d8de07b76d84fb1

      SHA512

      221edcaf8c21172dbf223a3440fbdf161fa6fccd5f4be84bfd84c7e857e569f96e4804a96043147e57d97ac7e94034a643762be1f71732089f480b4d3f3e3dc1

    • memory/2816-10-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/2816-12-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/3068-0-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/3068-2-0x0000000000401000-0x000000000040A000-memory.dmp

      Filesize

      36KB

    • memory/3068-11-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB