Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 15:08

General

  • Target

    072046daa751de645fe23217d120b094_JaffaCakes118.exe

  • Size

    389KB

  • MD5

    072046daa751de645fe23217d120b094

  • SHA1

    aa00286cd8e5970d89a36cd5b97507ed18eda274

  • SHA256

    9c82d7478581c614c7a1812132086aeab9606c214399e88fe7a1610414b9dc2e

  • SHA512

    7d7a696c6f4a2850fb061c9c2343a357ea26a2861e4127ce5ea84de550ecc47446773ec93fbf44fca99021b8f782ae29afaa7cbf449cdfe240f48d4103d9db77

  • SSDEEP

    6144:EB+84cWxC9sbMam4XspTJ755+SQ0F7YHXsJ4PLIlfR025aw7QbopcNb:NamgnRJDe0FYT0lGyQbjb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\072046daa751de645fe23217d120b094_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\072046daa751de645fe23217d120b094_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\windows\apppatch\fjqfp.exe
      "C:\windows\apppatch\fjqfp.exe" /i
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          24f7232fbf89df14500d6d2de9b8cd19

          SHA1

          e50ba807280e821dbd6889ac1837360782b658a6

          SHA256

          bb36359a6a650b9f6f57d0fa387e9e2c06cef7490f1899e67c8c8fb01027d0e1

          SHA512

          e108d01e8807f75dda2e98ae00c63017265dde91bcf17e5d19f33fcb23d72fc9cd9955ce3444c2e9aac562d1e7fec2b621fe08f7804735044b9fda8d9a9672bf

        • C:\Users\Admin\AppData\Local\Temp\Tar8A89.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Windows\388d3498.log

          Filesize

          96B

          MD5

          de81bfdaa51e6ff349164bf35db93e59

          SHA1

          e5999e9ecc0f34d3218fe54d5ed2886726bf7e90

          SHA256

          766f1dc6eb6978a58a19c2eef030e30806e5d091d07c9ca3a768fddd9fdd6117

          SHA512

          8e21574df23cfdea89d14c3e583cf8f11c5c686e2b5b964a1121123f6a77e7e6e425e287aa01deebc1f34e15dd3c8b547c1bc98a89e7b109cbe33553e9797b9f

        • \Windows\AppPatch\fjqfp.exe

          Filesize

          389KB

          MD5

          072046daa751de645fe23217d120b094

          SHA1

          aa00286cd8e5970d89a36cd5b97507ed18eda274

          SHA256

          9c82d7478581c614c7a1812132086aeab9606c214399e88fe7a1610414b9dc2e

          SHA512

          7d7a696c6f4a2850fb061c9c2343a357ea26a2861e4127ce5ea84de550ecc47446773ec93fbf44fca99021b8f782ae29afaa7cbf449cdfe240f48d4103d9db77

        • memory/2152-10-0x0000000002EC0000-0x0000000002F22000-memory.dmp

          Filesize

          392KB

        • memory/2152-4-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2152-1-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2152-0-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2152-153-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2888-78-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2888-149-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2888-151-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB