Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 17:15

General

  • Target

    081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe

  • Size

    306KB

  • MD5

    081ef821bb5d109d904439d142b41fc1

  • SHA1

    e79dc450b6bb62f9c81d3bbd0c0c2c1304ee6284

  • SHA256

    af1c0948c016b09643c8052d970c62b1f078245e667190a70fc05251ccf0be6e

  • SHA512

    7251afa06592f3acdc4154ba76b2a724602345a35619af60ab007cd114be046d12037bc91f0d2a8cf265255b355b641cb392b5b706e5e271525d218fcaf33a40

  • SSDEEP

    6144:WZgK4d8HTqfyYbq2qrdUQO9qqXPNNyAzG9T7kV0C/C:WmKE8HDlRTO9qqfGAUT7kKC/C

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1068
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1124
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1168
          • C:\Users\Admin\AppData\Local\Temp\081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\081ef821bb5d109d904439d142b41fc1_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Users\Admin\AppData\Roaming\Jusy\ugyj.exe
              "C:\Users\Admin\AppData\Roaming\Jusy\ugyj.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2348
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf8a9d24f.bat"
              3⤵
              • Deletes itself
              PID:2140
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2124

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpf8a9d24f.bat

            Filesize

            271B

            MD5

            584f8f60d57953b4df876e90d3b7cb72

            SHA1

            3a866dafa29f2270fa5ac364e6ec5fae884caed5

            SHA256

            1d06b96ce17be53ddc4ea9dbf69cf66ee0b0cf935070952d1bdb88d4a64d545e

            SHA512

            48cebc26397d4feb737a62142d1bfb7663dd37cc33259404e2e9aa694243d8c66cd8b6bd7c62df95e30263ddbd4399f877cc5817738db98b3f9ae1338a09dabe

          • \Users\Admin\AppData\Roaming\Jusy\ugyj.exe

            Filesize

            306KB

            MD5

            19d7a436aab88c66500700235f3e6a0f

            SHA1

            e7a5575f4433889f2dbbaa04a148cb060dbf8c0f

            SHA256

            0862b842de3a0776e240965bb7a298d50c1675475a461b829a47f232810fadb9

            SHA512

            a57a104a4d2d17a21507a43e5bed8658f80efd3fd1fc075aa73271f1ff1f5912ea27cd86cfce3de0ca1a2ae6e7869819a6972e373cfd6e59d60bed55ba157176

          • memory/1068-17-0x0000000002200000-0x0000000002242000-memory.dmp

            Filesize

            264KB

          • memory/1068-21-0x0000000002200000-0x0000000002242000-memory.dmp

            Filesize

            264KB

          • memory/1068-15-0x0000000002200000-0x0000000002242000-memory.dmp

            Filesize

            264KB

          • memory/1068-23-0x0000000002200000-0x0000000002242000-memory.dmp

            Filesize

            264KB

          • memory/1068-19-0x0000000002200000-0x0000000002242000-memory.dmp

            Filesize

            264KB

          • memory/1124-26-0x0000000000130000-0x0000000000172000-memory.dmp

            Filesize

            264KB

          • memory/1124-28-0x0000000000130000-0x0000000000172000-memory.dmp

            Filesize

            264KB

          • memory/1124-29-0x0000000000130000-0x0000000000172000-memory.dmp

            Filesize

            264KB

          • memory/1124-27-0x0000000000130000-0x0000000000172000-memory.dmp

            Filesize

            264KB

          • memory/1168-31-0x0000000002560000-0x00000000025A2000-memory.dmp

            Filesize

            264KB

          • memory/1168-32-0x0000000002560000-0x00000000025A2000-memory.dmp

            Filesize

            264KB

          • memory/1168-34-0x0000000002560000-0x00000000025A2000-memory.dmp

            Filesize

            264KB

          • memory/1168-33-0x0000000002560000-0x00000000025A2000-memory.dmp

            Filesize

            264KB

          • memory/2124-36-0x0000000001B90000-0x0000000001BD2000-memory.dmp

            Filesize

            264KB

          • memory/2124-37-0x0000000001B90000-0x0000000001BD2000-memory.dmp

            Filesize

            264KB

          • memory/2124-39-0x0000000001B90000-0x0000000001BD2000-memory.dmp

            Filesize

            264KB

          • memory/2124-38-0x0000000001B90000-0x0000000001BD2000-memory.dmp

            Filesize

            264KB

          • memory/2348-12-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/2348-274-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/2348-272-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/2348-13-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2348-275-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2372-76-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-70-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-52-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-50-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-48-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-46-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-44-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-43-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-42-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-41-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-56-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-60-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-61-0x0000000077670000-0x0000000077671000-memory.dmp

            Filesize

            4KB

          • memory/2372-62-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-64-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-66-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-68-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-54-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-72-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-74-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-1-0x00000000003B0000-0x00000000003FF000-memory.dmp

            Filesize

            316KB

          • memory/2372-78-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-58-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-45-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-5-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2372-130-0x0000000000540000-0x0000000000541000-memory.dmp

            Filesize

            4KB

          • memory/2372-154-0x00000000004B0000-0x00000000004F2000-memory.dmp

            Filesize

            264KB

          • memory/2372-153-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2372-152-0x00000000003B0000-0x00000000003FF000-memory.dmp

            Filesize

            316KB

          • memory/2372-4-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2372-3-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2372-2-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2372-0-0x00000000002A0000-0x00000000002E2000-memory.dmp

            Filesize

            264KB