Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 09:53

General

  • Target

    04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe

  • Size

    491KB

  • MD5

    04eb80dd59dd7ebe739b61cdfc6662c0

  • SHA1

    d900163f1fc7fbd62b1720af9f7c100ae351ace5

  • SHA256

    32224d8ce9b9eac3e7af9ce9a43dabf9580d93947ceb00f69c82d1c49a12f512

  • SHA512

    b252ace8fb1ac3ce786b82caedb64d430619c110b1d04f2ec1cd521a68f432527dd55692bfbc7b00358161760ef1767d561a221f764f1136024cc5f442197ea9

  • SSDEEP

    6144:u9tsz0ctIHFxQ/cKrL+i8HeRg7cQldsD7tLAB8:u6NtIPQ/rutgQlutI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\ProgramData\CV1pzRpTLPTHjs\6Do7DvHPUDWiNAK.exe
        "C:\ProgramData\CV1pzRpTLPTHjs\6Do7DvHPUDWiNAK.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\ProgramData\CV1pzRpTLPTHjs\6Do7DvHPUDWiNAK.exe
          "C:\ProgramData\CV1pzRpTLPTHjs\6Do7DvHPUDWiNAK.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe" /i:2520
            5⤵
              PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \ProgramData\CV1pzRpTLPTHjs\6Do7DvHPUDWiNAK.exe

      Filesize

      491KB

      MD5

      04eb80dd59dd7ebe739b61cdfc6662c0

      SHA1

      d900163f1fc7fbd62b1720af9f7c100ae351ace5

      SHA256

      32224d8ce9b9eac3e7af9ce9a43dabf9580d93947ceb00f69c82d1c49a12f512

      SHA512

      b252ace8fb1ac3ce786b82caedb64d430619c110b1d04f2ec1cd521a68f432527dd55692bfbc7b00358161760ef1767d561a221f764f1136024cc5f442197ea9

    • memory/1992-0-0x0000000074CD1000-0x0000000074CD2000-memory.dmp

      Filesize

      4KB

    • memory/1992-6-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2224-24-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2224-7-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2224-5-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2224-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2224-9-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB

    • memory/2224-8-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2224-27-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB

    • memory/2224-1-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2520-53-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2520-41-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB

    • memory/2520-55-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB

    • memory/2648-37-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2648-40-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB

    • memory/2648-30-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB

    • memory/2660-48-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2660-56-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2660-58-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

      Filesize

      1.1MB