Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 07:55

General

  • Target

    0d48a4e44c9d73a994bb4b0601821c69_JaffaCakes118.exe

  • Size

    532KB

  • MD5

    0d48a4e44c9d73a994bb4b0601821c69

  • SHA1

    2108ea6f78ea1918b8a7ed651eaf3d98ce93a818

  • SHA256

    bc4fda87b767b7e4e392f027d2ec233190d57dd50bf3a8c2ba1619f5914e47a6

  • SHA512

    93c4a5ffecd7ddfca815133b454a03090034b5b89cc05830a847d9f5bd5cf3cf5d0bc6984e6b9129e5cc2452da007fc9bb01f91a18131ed6cccf0617a2afc96f

  • SSDEEP

    3072:7+ZvkWp8qX96QfCDpMqrT4GmdVM3bXKCKk3T1a/PTYhA7Jf22QA6Ivv1tH/nSrNV:aZmqt6Qyiy3b6CR10TY8JOArF9S9x

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d48a4e44c9d73a994bb4b0601821c69_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d48a4e44c9d73a994bb4b0601821c69_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:5020

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

            Filesize

            532KB

            MD5

            0d48a4e44c9d73a994bb4b0601821c69

            SHA1

            2108ea6f78ea1918b8a7ed651eaf3d98ce93a818

            SHA256

            bc4fda87b767b7e4e392f027d2ec233190d57dd50bf3a8c2ba1619f5914e47a6

            SHA512

            93c4a5ffecd7ddfca815133b454a03090034b5b89cc05830a847d9f5bd5cf3cf5d0bc6984e6b9129e5cc2452da007fc9bb01f91a18131ed6cccf0617a2afc96f

          • \??\c:\$$$$$.bat

            Filesize

            228B

            MD5

            719dd05daff131782637c921ffbda112

            SHA1

            f0c0ca3c75edade64891cd2ab6d3db26f1ef378a

            SHA256

            1f9b70d0d72f58a338deaa9e153fcc51aa90f2174e15d922f20712d7b295c221

            SHA512

            19449d9b339cd101ba420ae099a2851c3f01a6f4be091a5c8a05b05526a0ee4775540118b84959c466caa45442942ab4c7be9962243243c607d99f8490ea61b1

          • memory/4188-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4188-704-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4188-821-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB