Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 08:19

General

  • Target

    21ad3791c38aa0ece724453649531c9e_JaffaCakes118.exe

  • Size

    19KB

  • MD5

    21ad3791c38aa0ece724453649531c9e

  • SHA1

    bc6b53830088e9fb099d0668973829470e196931

  • SHA256

    392b64aeed65407c9cb7336a4c89d1ef34111fd7b9c74c8b6e45b2c91b7bbc42

  • SHA512

    e483f9e37caf38e631d9d074758ddb6ea6da06c9e8d253b107dae0a7591b48d47715f51ac4a60762c917fc407e23f11ac0590bef6fa99937d6dd9df5ebe466e9

  • SSDEEP

    384:0/c7Kxe4jLX1MQVt3KN5SQzSAxCvIcmdsXgn/wHEhdEQSIe6bDl2LzM4X:0/AKFvX1vt3KuQ3Cv8dWgYkAQfeQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\21ad3791c38aa0ece724453649531c9e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\21ad3791c38aa0ece724453649531c9e_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\PTSShell.dll

      Filesize

      32KB

      MD5

      6c2eba1f56d20b56d746886cccd25193

      SHA1

      d7d69b429ae471381e139fb1cbac301cb6ab3709

      SHA256

      76f3a638b2c15bd17e82c405f37bdfa77cebf5b8580d79235ac513c976ad2e5d

      SHA512

      35e23251837466149070869c246dbaf9e1cec9c288c10172fc3c3b5b40587783c8c89705ff9902d9470f301de6b492555552af8efa20c7d57227357d2f3e7e18

    • memory/1100-3-0x0000000002580000-0x0000000002581000-memory.dmp

      Filesize

      4KB

    • memory/1100-10-0x0000000002590000-0x0000000002591000-memory.dmp

      Filesize

      4KB

    • memory/1100-6-0x0000000002580000-0x0000000002581000-memory.dmp

      Filesize

      4KB

    • memory/2908-0-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2908-13-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/2908-14-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2908-15-0x0000000010000000-0x000000001000B000-memory.dmp

      Filesize

      44KB