Analysis

  • max time kernel
    147s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 17:09 UTC

General

  • Target

    16cf0d0a9af15d20fabe1d47e492246d_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    16cf0d0a9af15d20fabe1d47e492246d

  • SHA1

    7b4048c1eb2ee82145b4b26da3d49611f301304b

  • SHA256

    f8ebf0c40feb20b9714011fd4d058912897ed36a2fbf5c9965525542ecd5045d

  • SHA512

    3e047b783f4450b13ed4988b93511c9b26ebbcfcd377ad353ac8e5775e258a35598a85aa586f26fbd66283940f80b4e5663eeb4d1175a2631b5d000fe0a82200

  • SSDEEP

    768:tembNRqsuhlGOBrhgFwumSCbxTGy/BBGg4NKJJKqUThbJ32+ve7i40vN0TlT+Xk+:jnqdu3abBGy3G8V0iuo2j

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 35 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16cf0d0a9af15d20fabe1d47e492246d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\16cf0d0a9af15d20fabe1d47e492246d_JaffaCakes118.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\izav.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\izav.exe" 16cf0d0a9af15d20fabe1d47e492246d_JaffaCakes118
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\Windows 3D.scr

    Filesize

    76KB

    MD5

    dc6d47deccda12a07e742a3929e5106f

    SHA1

    2a83b6c5d6a4060e8f816503e83b5c42f84fd176

    SHA256

    2faf00becc95fd78520db0fbf499256ffe2e17ae43ba24fa2987537dd4a7da0e

    SHA512

    ac5e2da856de241882caaa3a599d4f79fd0dcbac48cee03c54aad0372231a39832d8ab42c0a01dc0530dcf78d3b63d6c21cd8e00b41846e219b8645d9bddb84d

  • \??\c:\windows\SysWOW64\maxtrox.txt

    Filesize

    8B

    MD5

    24865ca220aa1936cbac0a57685217c5

    SHA1

    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

    SHA256

    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

    SHA512

    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

  • \Users\Admin\AppData\Roaming\Microsoft\izav.exe

    Filesize

    76KB

    MD5

    bd1469d9b5d09a8c4924d4642885f11a

    SHA1

    e7f990b4287e21b190eca95e9f69f63f7c338cfd

    SHA256

    1ea350176f9a6aed1e4c2b8be5037dabc576909afd429ee53158b22540dc50eb

    SHA512

    711b2aae1a6b828e86e18385ae726e1dc3e49ac7eb8b930e252b35ba3c70a9b08b45dadf31f5fb908740121afb664daa09112ff4f3f660f2f32fc5570b5e0d39

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.