Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 02:35

General

  • Target

    20caea201784059e396d6d6721fa4a72_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    20caea201784059e396d6d6721fa4a72

  • SHA1

    dd35113cb486c1f124ba8b3b519e4f1ea161b888

  • SHA256

    d62ec4e13aa9c93915f4efdc9aff6e0024240deb15404b007d2d17b126e268cc

  • SHA512

    5c9ff8a705586ee229d23f94bccbaadf02e09976f21e3be92c848617baed8914524dcab10f3a254c83237da73480fb92ddf2a4648bc29721a330bd538abe3a39

  • SSDEEP

    384:ZHhTDeXzk79vyVFwbk4v5L5QjIsRCgao:nMcvQSbka8IS0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20caea201784059e396d6d6721fa4a72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\20caea201784059e396d6d6721fa4a72_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2788
    • \??\c:\windows\ld09.exe
      c:\windows\ld09.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\d45.bat
      2⤵
      • Deletes itself
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\ld09.exe

    Filesize

    15KB

    MD5

    20caea201784059e396d6d6721fa4a72

    SHA1

    dd35113cb486c1f124ba8b3b519e4f1ea161b888

    SHA256

    d62ec4e13aa9c93915f4efdc9aff6e0024240deb15404b007d2d17b126e268cc

    SHA512

    5c9ff8a705586ee229d23f94bccbaadf02e09976f21e3be92c848617baed8914524dcab10f3a254c83237da73480fb92ddf2a4648bc29721a330bd538abe3a39

  • C:\d45.bat

    Filesize

    263B

    MD5

    ab80d8b088d60b8acdeebea0303bfb72

    SHA1

    befff978a0d7d670e1f0cf6c5b610d010fffaa26

    SHA256

    5c6fa60c305d2f9f56a38729892bd56dbf324f08d6819e887184c60f846a7ecb

    SHA512

    649be8e4e9cca8bf130eded6fadd29acf24a195c3cecaee1bef411f76ffabf6409aae8bbafb7c9c6a0b86487ce97146af939ec9dfdbdd7b885efb285f891700f

  • memory/1932-18-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1932-20-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2788-4-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB