Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 13:05

General

  • Target

    064041ee4017728e754ab7bacc9f4978_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    064041ee4017728e754ab7bacc9f4978

  • SHA1

    ce0623e7fd4295587e364bd107c012069ed0865b

  • SHA256

    07ab9ddbcdaa3efd006c1a80806dd925de3883ad8f24ee795dc6bc6c2f59133d

  • SHA512

    f7a68666e88988d89bc89cc34d60dcc83ea6ed4ce61f6e33c15f3dfd6c88d506c37a39937913a69e1238c5fa996ec5eb3185ceb0070594c3f9777081dc00ca94

  • SSDEEP

    384:JSETnMZEj5MZINTMKg6Bb7QbmuDWMFCiSsb1fEg/4:JSmMZEAAT9Bb7Q3Bxb1T/4

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\064041ee4017728e754ab7bacc9f4978_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\064041ee4017728e754ab7bacc9f4978_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\94E0.tmp.bat
      2⤵
      • Deletes itself
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\94E0.tmp.bat

    Filesize

    207B

    MD5

    3b9ec44a0638bb7b3993f3649ce8c38f

    SHA1

    dc52f2ba1efb573d38390317e6c9cf7b5a46e414

    SHA256

    c9f0bf06791139497d91a44d87476a8e6f3e6a5ce5ceb7f55d37e871f69dc6aa

    SHA512

    d81bec9900c2ba53f0dbf1cc7d99b908f15ca169eee792b0551886d015c0243986349f3acd20be980906d412c70b1e1ef7e5bba7a5d07c9d7361b7423925dcc2

  • \Windows\SysWOW64\bootvidgj.dll

    Filesize

    917KB

    MD5

    14834b02d9e2dd9995be0615ec698252

    SHA1

    5ef4b6888a9f21d267c31eb12e55f86eee4f0ce0

    SHA256

    aee97f6b9754ac87a95e6bdec0652e4ed1156ad2f7d58071f9f46e73f53ba5fe

    SHA512

    78ce2fd1f6e88fe251f9206e362b31aca2fc58fd7380eba8473faaffd34161addc1e00efa94ce128eb15fd91b3887afc163f1386fbab59a2ab8b86bbcea99784

  • memory/3040-12-0x0000000020000000-0x000000002000A000-memory.dmp

    Filesize

    40KB

  • memory/3040-21-0x0000000020000000-0x000000002000A000-memory.dmp

    Filesize

    40KB