Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 19:27

General

  • Target

    173e37e86ca3b35cf347f92a03b71176_JaffaCakes118.exe

  • Size

    19KB

  • MD5

    173e37e86ca3b35cf347f92a03b71176

  • SHA1

    1bf001f747c5246103a91e90f6d45473cd525d64

  • SHA256

    58238479a0173c49134a37bdcf85ac90768ceb8ced8d86c7ea51389e1c0b6ad6

  • SHA512

    3a3ebbd1fdad2b3cf308f2e161b6e4ec0eb2a7b92718611df6c3e43b0070223271fe65b6ba3332d86d3a0ebf9e2d8bf8a4ce244ff3cafaba6231ac415a257abf

  • SSDEEP

    384:x8ZLb/+nRhDHdUBklBPkyPlJR0y1wCfZGnfwNlgmLr51f4:aZf4H9U2DcgYyUINqmw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\173e37e86ca3b35cf347f92a03b71176_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\173e37e86ca3b35cf347f92a03b71176_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\dbhlp32.dlL

      Filesize

      27KB

      MD5

      e4117b08e0145f6bd3eefc4717af1706

      SHA1

      153a1e54afd537951ad3da1bd7286bfdd6d4217d

      SHA256

      531ca0059d544b0643f57d46cc5efa0a6018c5a608d4609c4008d760e4bfa9cc

      SHA512

      58589ba758e4b34213a9f4e4d8eff4c5ba2946d9a83ac40c8724305b7c3358cf905c7534ffb8a0196a37bcf1e8cbda2a647ea495ca843a664f351a2fd4e3dd7d

    • memory/724-0-0x0000000000400000-0x000000000040D000-memory.dmp

      Filesize

      52KB

    • memory/724-8-0x0000000000680000-0x0000000000681000-memory.dmp

      Filesize

      4KB

    • memory/724-6-0x0000000000670000-0x0000000000671000-memory.dmp

      Filesize

      4KB

    • memory/724-14-0x0000000000400000-0x000000000040D000-memory.dmp

      Filesize

      52KB

    • memory/724-13-0x0000000000402000-0x0000000000403000-memory.dmp

      Filesize

      4KB

    • memory/3532-3-0x0000000002810000-0x0000000002811000-memory.dmp

      Filesize

      4KB