Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 12:11

General

  • Target

    1b40907222a71823d5ed01da2b16fd70_JaffaCakes118.exe

  • Size

    777KB

  • MD5

    1b40907222a71823d5ed01da2b16fd70

  • SHA1

    766fae3f86bdc55c3bd6afe57d701db8ec109145

  • SHA256

    8e63b368d9df549a290764cb36d8345bcdcb4a5d99f6976202d905ca6ebc4a05

  • SHA512

    74cd93a912149d2e444a339127138af129e38a49ddf79280e2c14ba5fcf51c65fc6d2c2e99ded56c5096779efa785c8d7341922fa5b919ab9f52a6f26cd531ae

  • SSDEEP

    24576:5j78zDkR8LQ3yD9luuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuTuuuuuuuuuuuuud:5/BO8Suuuuuuuuuuuuuuuuuuuuuuuuue

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b40907222a71823d5ed01da2b16fd70_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b40907222a71823d5ed01da2b16fd70_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\inilog\fplay.exe
      "C:\inilog\fplay.exe"
      2⤵
      • Executes dropped EXE
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \inilog\fplay.exe

    Filesize

    22KB

    MD5

    e9b4dc74e76ca4d955eae96f01070975

    SHA1

    7b9b7e13b75b469c5d48d6039aa13518402d586e

    SHA256

    3c345a5df9fe6fbc4885d2ed9be3e8ac6e9540756372c58df992c540b006a232

    SHA512

    a4fba13f1fe00d962a7a8e4cb2038be101b35368944d0750f79505fdcd7080ce81d404bd3766b1a5e98e5f2d1d3fa5628ea7d8cee2ad26c989024368653defd7

  • memory/1740-15-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-10-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-17-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-19-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-12-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1740-13-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-16-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1740-26-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-25-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-11-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-20-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-21-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-22-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-23-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1740-24-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2680-9-0x0000000000120000-0x00000000001A0000-memory.dmp

    Filesize

    512KB

  • memory/2680-14-0x0000000000120000-0x00000000001A0000-memory.dmp

    Filesize

    512KB