Analysis

  • max time kernel
    121s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 08:55

General

  • Target

    15650808b754f8886c63e44915e5e838_JaffaCakes118.exe

  • Size

    464KB

  • MD5

    15650808b754f8886c63e44915e5e838

  • SHA1

    22000b9d39eb03a6f6bb8674810691e1e740da85

  • SHA256

    90cdde4401cad305f8bccbc043654a7bbc7ea4050576f2af1008ab4f9f139c01

  • SHA512

    8126fa2e73e21ea43284ce1b189278a2cc8d842a3ddfb320b5743a56c5753cbb82fde7a99b199e6cca0a94eed79dd9850cc9ec6429160476f893ecd96e93f987

  • SSDEEP

    12288:NtKe6Zv23YdL/W5L/SZdSCvTF+bDTqXTa7v5ouBdSJeM:d6Zv24/WNSZ8CLGETEjnSL

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15650808b754f8886c63e44915e5e838_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15650808b754f8886c63e44915e5e838_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\concp32.exe

    Filesize

    471KB

    MD5

    fb32acdaa60dc0aafb777b93a09c069d

    SHA1

    3ef07554e71d1285769e8c4bfe2ff236cd82274e

    SHA256

    e8ec214f6d30cdf241c8cb66683b525a205b0be838ebf6952762e2e96b4aa31d

    SHA512

    b1103d3a17430cef3c260aca2b975bbc2cf98946d2a94cc934af017cccaedede06a477ddb029c88f2a51d70d71ed4ff72a9533ae26e7d744954eef5aa11a16c5

  • C:\Windows\spoolsv.exe

    Filesize

    465KB

    MD5

    28c8ed63a31138173844cd29a0c24e8c

    SHA1

    8b00b985ce4c4968a896fd2261ac34bd9ac29551

    SHA256

    279b99ad790119aa9c7793eae838150afc13b15d8f407b47323a6419e7e7c5f6

    SHA512

    b1589f2bc323f81efe66ca3d86094a627896ba4741bc21a939bbd27ecebb86ca4111316c0bd1d192333ebe8209ff0d458b304883af272ac62ea4f8f81a402706

  • memory/1952-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1952-15-0x0000000000220000-0x0000000000255000-memory.dmp

    Filesize

    212KB

  • memory/1952-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1952-13-0x0000000000220000-0x0000000000255000-memory.dmp

    Filesize

    212KB

  • memory/2908-17-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB