Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 03:31

General

  • Target

    14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    14865979b7de1bd85db6acfdc80f586d

  • SHA1

    62b82f777b7adf1749129438a918568bb5dba199

  • SHA256

    4053633e95b1cd13bd4148b4ab73800c9d4e31d5c32e243a383433b982db2c65

  • SHA512

    f7ca61784980068dac771a73b525e3dd306db93a5b64045be9f071fc38d4533720e1e9fd540a1c0105c79608dcd239cf776c32986df8e510a315096b1069220d

  • SSDEEP

    1536:MGf8Y252ssS2OEyGoEiObEIpk34bYesPPmDEKkObg7AIz8Qnh9u8nXPbLnnnnHUF:525A7qXwrQSEv7fz8BkUF

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\ieagent.exe
      "C:\Windows\system32\ieagent.exe"
      2⤵
      • Executes dropped EXE
      PID:2120
  • C:\Windows\SysWOW64\ieagent.exe
    C:\Windows\SysWOW64\ieagent.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\SysWOW64\ieassistant.exe
      "C:\Windows\system32\ieassistant.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ieagent.exe

    Filesize

    22KB

    MD5

    be2f8e88f3734372bb6fdea308ff11b4

    SHA1

    4490d7a90998727bc882180c356fddb66d67798a

    SHA256

    7e8de87bd8fe3c432400f5ff8fd96cf7273e01dc04ebf5b69217e9058358c6c9

    SHA512

    5b2fae0f0076e4b91163ad254b3440f6653a4b7d0d005456ce7f9cdfec3f1d0add15bb0930e4f814c666375bf1f7557637f5128e74e94c98109fb623d022148b

  • C:\Windows\SysWOW64\ieassistant.exe

    Filesize

    68KB

    MD5

    14865979b7de1bd85db6acfdc80f586d

    SHA1

    62b82f777b7adf1749129438a918568bb5dba199

    SHA256

    4053633e95b1cd13bd4148b4ab73800c9d4e31d5c32e243a383433b982db2c65

    SHA512

    f7ca61784980068dac771a73b525e3dd306db93a5b64045be9f071fc38d4533720e1e9fd540a1c0105c79608dcd239cf776c32986df8e510a315096b1069220d