Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 05:26

General

  • Target

    0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe

  • Size

    2.8MB

  • MD5

    0cc7aea12dcb1c719c281c186fe53e4c

  • SHA1

    48a02d6a917523716e17becc95b6b449d50ceffb

  • SHA256

    f28c793f683ba6deee7510b60f0a5e90830df59d81d10907c6bdbd08e3d5136b

  • SHA512

    b50072a50895f8e74ed587dfb16bd43b0a3ccf3b24304d6c6e052fb1d30a1af34d793424501ffb72bd701f9b2c9ac1fa1014d966a851fc9d5882fe06fc442d92

  • SSDEEP

    49152:Kh+Iy6ausuSc41msMQ/FwZcG+cpWgyJD9hixDHopctc+kMUeoW:KEIy6ak4MCM+8pKbi1H4hMUg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe
      "C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2552

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\NOD32.png

          Filesize

          72KB

          MD5

          be0fbff8e9330f29d06daa16fa6532ac

          SHA1

          005f4e11c3d5079a1eb7d2cdd0853211d6fe7369

          SHA256

          55bb257a5f110e3ed5218bf3ac0e785277c3918bc9ab58400fa7dc5fce48d945

          SHA512

          f36f039ab64069fbda4ce0aa81ebf956a4ca7644025d363b6a619d9911e9a3eeb1acc6bc254d3a1423a62cbe2fb213218998f3053ddd2f569c3929c0a2e7c8a8

        • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\update-button.png

          Filesize

          936B

          MD5

          410a51d506e46d96977ba17c0d62fc08

          SHA1

          222f975f927ebcf9c6a0763b7abb71dd245ffffa

          SHA256

          3507817bbcb56505a9e74d9e9513451d9f239a41e1c321cc9dee0cb238f6e5ff

          SHA512

          316ec8cfa968fa53b93ba510b8f7ef8fa6049ab9b441f0b96bff3e574b43090a42b4da3d0336c86a20103b1f7f2798dd8cad0cc6117cca713c272b24a632f71a

        • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\autorun.cdd

          Filesize

          11KB

          MD5

          0a5d1f6f364140063684926b508d272f

          SHA1

          8299a808f3a5058a22029e78b8f2fea2fa312002

          SHA256

          6b2b2640881482a70ef8ab5e5f5ff54157269863612b1154df028f5cc62ea4e4

          SHA512

          374448710b772612969963a122b11be19392e08fa12c3c329f7a95a5ec24f234782ae9e0e9254dff17f25a271714d716a15214d4b69e923759afa9723c6403ca

        • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\x.ico

          Filesize

          97KB

          MD5

          7d53a14e6220cf0fbdb3b204c2a4064f

          SHA1

          c649d6e14d28a085bd153600cd4fe602e7ae071f

          SHA256

          9c7157762ee5f5643f00073d47b795807173efcfa282928747e3c9413906a7b4

          SHA512

          5be3d44daf663f8057e0c6154ed4e43d6b0406a75ee6f3b994b6c56a1a3d158d92e546614bf06490038726a74c6b1fe3e3c983ddb6313e79e4773b9b9dec5cc2

        • \Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe

          Filesize

          2.8MB

          MD5

          78f01d099d2b759d2936c58f8005cbbe

          SHA1

          6996af950e4d6bb6fd2aa0af5cafae8af1d8c97a

          SHA256

          ffa740e17c4dac2cb65bf8d3e931992c73cf373a1203713d1743e247254f0fa6

          SHA512

          e92cba8948983db09acba445de04cbfd081854f3b468dcd102db8e67f89e94ead01fa1961ed823e1479b78e83cb005e22137dc98282abca019358d81fc3d45b9

        • memory/1044-0-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/1044-127-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB