Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 20:43

General

  • Target

    0f76496ed3b409b83e60754b0f632bb2_JaffaCakes118.exe

  • Size

    416KB

  • MD5

    0f76496ed3b409b83e60754b0f632bb2

  • SHA1

    46062e78292524f6e4ebd3598333a5af9e559b99

  • SHA256

    6f88a666cc8e4891ecc6a91647ee0ff2a90d308dee978d1dca3ec992e1f4d363

  • SHA512

    5df3c312afd4fee3f8deabec595f778925ecb745090d09bfa0eabeceee1b7b7a0d047e207ab7c9a6f946740fa71be4615357d9224f0c23349cd3ed4a6e0b7d5f

  • SSDEEP

    6144:y8BL683B3J3GZY8S4raGBR56dnYmh4uzPoYM0yznsh0H9bpdDHvbmHvEjR1B:y8BVB3UHPwAYnepb/DHzmHcj

Malware Config

Signatures

  • Windows security bypass 2 TTPs 10 IoCs
  • Disables taskbar notifications via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f76496ed3b409b83e60754b0f632bb2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f76496ed3b409b83e60754b0f632bb2_JaffaCakes118.exe"
    1⤵
    • Windows security bypass
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\ProgramData\043A6A5B00014973000BF823B4EB2331\043A6A5B00014973000BF823B4EB2331.exe
      "C:\ProgramData\043A6A5B00014973000BF823B4EB2331\043A6A5B00014973000BF823B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\0f76496ed3b409b83e60754b0f632bb2_JaffaCakes118.exe"
      2⤵
      • Windows security bypass
      • Deletes itself
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\043A6A5B00014973000BF823B4EB2331\043A6A5B00014973000BF823B4EB2331.exe

    Filesize

    416KB

    MD5

    0f76496ed3b409b83e60754b0f632bb2

    SHA1

    46062e78292524f6e4ebd3598333a5af9e559b99

    SHA256

    6f88a666cc8e4891ecc6a91647ee0ff2a90d308dee978d1dca3ec992e1f4d363

    SHA512

    5df3c312afd4fee3f8deabec595f778925ecb745090d09bfa0eabeceee1b7b7a0d047e207ab7c9a6f946740fa71be4615357d9224f0c23349cd3ed4a6e0b7d5f

  • memory/1884-13-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/1884-11-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/1884-18-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/1884-29-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/1884-30-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/1884-35-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/2300-1-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/2300-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2300-2-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/2300-17-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB

  • memory/2300-26-0x0000000000410000-0x0000000000501000-memory.dmp

    Filesize

    964KB