Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 12:13

General

  • Target

    05e1f71cb030e79bd08c6cea09da5672_JaffaCakes118.exe

  • Size

    133KB

  • MD5

    05e1f71cb030e79bd08c6cea09da5672

  • SHA1

    a1f020ecfeccd0e271f91285cfdf62e2343e532a

  • SHA256

    83797610c1b74ca56ef18e81681c316256017dc22f8ac14fe873518f70250515

  • SHA512

    00155300f059e15684ed73d944625f0834fb81ea8e04142c3092325a09d1ff4b93b5c15e4d6ea455d971ecd55321996785129efffa5d5b7cdee709e8f05cb6bd

  • SSDEEP

    3072:UTGNOKVjANUemskniQYQZuw9UJq31qaJRBel9:UTG4OHBYQZt31qg/el

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies data under HKEY_USERS 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05e1f71cb030e79bd08c6cea09da5672_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05e1f71cb030e79bd08c6cea09da5672_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a18371$$.bat
      2⤵
      • Deletes itself
      PID:3040
  • C:\Program Files\stsisvc.exe
    "C:\Program Files\stsisvc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1332

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\stsisvc.exe

    Filesize

    133KB

    MD5

    05e1f71cb030e79bd08c6cea09da5672

    SHA1

    a1f020ecfeccd0e271f91285cfdf62e2343e532a

    SHA256

    83797610c1b74ca56ef18e81681c316256017dc22f8ac14fe873518f70250515

    SHA512

    00155300f059e15684ed73d944625f0834fb81ea8e04142c3092325a09d1ff4b93b5c15e4d6ea455d971ecd55321996785129efffa5d5b7cdee709e8f05cb6bd

  • C:\Users\Admin\AppData\Local\Temp\$$a18371$$.bat

    Filesize

    152B

    MD5

    fe6463e40c28111f74bdcd613690b61c

    SHA1

    2a66d73da28f8089231c757440e05ef0ce4817f4

    SHA256

    db72be08e4dc0a19fa9b06eab8bb72a3e363a8ab0d3dd3c62406da43e52134a2

    SHA512

    b31794d629476bf8f3849cd029ec41ab2ad4de9c481d6e6dc73edcf33f58770ee8e1ccc297b2a95cffad128b8c4c2d8c6281ae0e1443746b3a403f3a81e742fa

  • memory/1052-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1052-12-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1332-3-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1332-14-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB