Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 14:08

General

  • Target

    1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe

  • Size

    10KB

  • MD5

    1647d99b58dcf0e1fed7587a87e00820

  • SHA1

    f9c6e449712dc86057a3ecd4f89798f5c41e85e5

  • SHA256

    22d9a60c09466f554581cde1814ec746d0fe44461a9234801a45ecc8e26459d8

  • SHA512

    4ef490b3c66873551926db9203dab0e29396dd075b0e5607e806a64c738105677c98111ff62531d6ca7ec16dd8c05e37695fd37cc1c6ea3e7d2aa6f04bf50466

  • SSDEEP

    192:0UZuqGusyVHS5FpdhdH2imZ1Nq7jza2itLcgJ37+:9ZFGCHS7v2imZ1N4zkggB+

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\reglakok.exe
      C:\Windows\system32\reglakok.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe.bat
      2⤵
      • Deletes itself
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe.bat

    Filesize

    210B

    MD5

    72836a54d97973b53e93f95b0256b01e

    SHA1

    3e535b553ff23b8c72538986f5137f65953f3c55

    SHA256

    fe393b87bb93b4604eba23c2f9c4b8314bbba585816bb4c0cc580a18faaf9ca4

    SHA512

    e52e8cf9aecea14ebd5d49d65c65e7f5fae83b4e6f6eee269146c49e17825a17787d81076beea3173ad9249aa299c1e6df7c718d7afb74c4ceebf7244040159f

  • \Windows\SysWOW64\reglakok.exe

    Filesize

    10KB

    MD5

    1647d99b58dcf0e1fed7587a87e00820

    SHA1

    f9c6e449712dc86057a3ecd4f89798f5c41e85e5

    SHA256

    22d9a60c09466f554581cde1814ec746d0fe44461a9234801a45ecc8e26459d8

    SHA512

    4ef490b3c66873551926db9203dab0e29396dd075b0e5607e806a64c738105677c98111ff62531d6ca7ec16dd8c05e37695fd37cc1c6ea3e7d2aa6f04bf50466

  • memory/1900-12-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1920-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1920-5-0x0000000000030000-0x000000000003F000-memory.dmp

    Filesize

    60KB

  • memory/1920-11-0x0000000000030000-0x000000000003F000-memory.dmp

    Filesize

    60KB

  • memory/1920-20-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB