Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/06/2024, 22:35

General

  • Target

    031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    031d072c531abcf719f69ffb526f804e

  • SHA1

    775c41e27097d1bbd6aab1845f105ddaaec17cc8

  • SHA256

    da7d05d868f1c05cd97ca32d30620253a10034a1f271bef9db5fa3f5e693b929

  • SHA512

    5c38e8d4dbb77e23c754c150069f0d939f5652c86c95f746fb5f2d3d8e7ba5f475d6add8f1472a0ee81908bc2fd82fdc45b1c27a2851735c4c428652212e1185

  • SSDEEP

    49152:D2c/RGx8qEyPMxXn0DPDv8Kq8bIBXFbVR/yyqBDZ2ssO/M:qEU8vyP+XnAr0Kq8bIBVbypDZ2S/M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\is-0L9RI.tmp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0L9RI.tmp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.tmp" /SL5="$800E0,2408487,52224,C:\Users\Admin\AppData\Local\Temp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-0L9RI.tmp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.tmp

    Filesize

    662KB

    MD5

    b45570ddb00885bfe9e878af91a90564

    SHA1

    66daf059333962a65735999e99eb868cf9d5e832

    SHA256

    29fedae831f5b1704e5b53351cd6b8d33a21b7971894a9d0385895d7662e264f

    SHA512

    84350f30f9372be749fa244190b7d35a02aa2ce1ded9b45d89c29135a384e1170a54ef1af7004836ab9c30770a44f7e085b0cb238786a6d93d7e8cdec993d768

  • C:\Users\Admin\AppData\Local\Temp\is-D7TUO.tmp\_isetup\_isdecmp.dll

    Filesize

    13KB

    MD5

    a813d18268affd4763dde940246dc7e5

    SHA1

    c7366e1fd925c17cc6068001bd38eaef5b42852f

    SHA256

    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

    SHA512

    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

  • memory/2080-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2080-3-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2080-19-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2348-18-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2348-20-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB