Analysis

  • max time kernel
    134s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 22:30

General

  • Target

    23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe

  • Size

    26KB

  • MD5

    23ab86e2c6b7e4d0b709ebc19310793a

  • SHA1

    663ebbf278740c2dec0279b324580da012bf2d00

  • SHA256

    f35b43e0c11a9beadaba20ff8b74fca4c94e7cda439960a2037538c9ae0334be

  • SHA512

    9f9eff38c4de0094af9fcdb26b12674de65085c9267698899b88c0f1f456cd227c0b62d476f6f83cf046ad54cc37708e75d2b9cb337f3c81f3a7128a0b85a785

  • SSDEEP

    384:QCwlMY4ntrjWpJ6ja8E3xraXq7PBZmFfWzdqTOwrPWkjmErjAxYr6+e9Pfqbn1f:QCwlMBnl46jqrKYaf4KrPhr0xPha5f

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\Fonts\copy2090000.bat
      2⤵
      • Drops file in Windows directory
      PID:4552
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\Fonts\del.bat
      2⤵
        PID:2812
    • C:\Windows\Fonts\4FD40F62.EXE
      C:\Windows\Fonts\4FD40F62.EXE -k
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:532
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=4648 /prefetch:8
      1⤵
        PID:3196

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Fonts\4FD40F62.EXE

        Filesize

        26KB

        MD5

        23ab86e2c6b7e4d0b709ebc19310793a

        SHA1

        663ebbf278740c2dec0279b324580da012bf2d00

        SHA256

        f35b43e0c11a9beadaba20ff8b74fca4c94e7cda439960a2037538c9ae0334be

        SHA512

        9f9eff38c4de0094af9fcdb26b12674de65085c9267698899b88c0f1f456cd227c0b62d476f6f83cf046ad54cc37708e75d2b9cb337f3c81f3a7128a0b85a785

      • C:\Windows\Fonts\copy2090000.bat

        Filesize

        152B

        MD5

        fdfd0aaeae79bb7be8c30ca67909b0c3

        SHA1

        cf13726f998c66c4f9a334cfdf1daf371549be90

        SHA256

        aab60681f9bf2657549040086b5d7c48a97a3dd1aa327f8c34ffed89b465cc4f

        SHA512

        35a0f58dc8c5ca2c49bd270798d348cd15a18b2fac2c23344c0d5aa2d08cd607beb0648e848cb75edab9fb321d0b0f5cd826c6eca39f284c51457bdf15166711

      • C:\Windows\Fonts\del.bat

        Filesize

        239B

        MD5

        cb76de6e59582eec4326865d86328150

        SHA1

        06e9dd818050395194a2fe64a40a70ed102f2834

        SHA256

        80a859cdd3e9cac55050accc01504a4818a051e7e1d2cee4c43521c3e847dd53

        SHA512

        7652bfcbc531a0993a4d246b9b810cddc55f3a6ecef7a53f372a33af710ad7bb669b633dd5a11fddf24609affc1ec9f5eeb64b47ced01e65df0998353c4110d1

      • memory/532-7-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/532-15-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/4784-0-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/4784-13-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB