Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 05:37

General

  • Target

    213fa87c5aac597a618c7eadc93a4cba_JaffaCakes118.exe

  • Size

    114KB

  • MD5

    213fa87c5aac597a618c7eadc93a4cba

  • SHA1

    3940b30ede542da6accfe102487d824518f88c10

  • SHA256

    dd8d501184e1a47a7c6eff05bde42d36d5e9cd643cf9e9e4b51818f3faa5c870

  • SHA512

    d135befec1c526f57c38ddc5d1a2c22fd083ab49662ea7f8180a20fe9f5a34e3fae3beee26173f6a8df7414516df7cf757109da217de9557d3b7be77fc834f1b

  • SSDEEP

    1536:coCMXPcJf6d2c+hxsU3ZVGtIIvDckEF25FzTjm1D7mmKB7HSBCxLa5Wum:coCMXP+f6FmxNzKIIvDVzfmlmUBH5Wum

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\213fa87c5aac597a618c7eadc93a4cba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\213fa87c5aac597a618c7eadc93a4cba_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\A2B6B4FD.cmd
      2⤵
      • Deletes itself
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A2B6B4FD.cmd

    Filesize

    291B

    MD5

    2ea70268a8f1acfe9fb495adaf30b355

    SHA1

    c9eb085aeec1dd09941326fcce36e7aaefd2bb82

    SHA256

    58dc66530103d88c1216c0095abbbabdd895535a754cb8e8f765218b0c9ef25e

    SHA512

    a472cc947282fc470a657e5619a0591ca951b56fd405f23002a26e28c9ebfc642e3f3f49b9db84806023e06374b9011eab089131f944d9baa056dbb8f5eb88c3

  • memory/2124-7-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB