Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 10:50

General

  • Target

    221975dc0a598c5bca12d74713845002_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    221975dc0a598c5bca12d74713845002

  • SHA1

    36b2db8d7722cfe4df414808bb94e03de6f1755d

  • SHA256

    02b8b021b839cd4b9388ac87fa6fd00254dabaf35c3c23e8fe04124935f9bb89

  • SHA512

    a42a216e1c108f79b21352444627370bbb04a14b8079f6e0cdf6757fb3a54dfff706ab61fd3819933ab7b97913e2021dd93d57521fcb71eed9c8936b39a01610

  • SSDEEP

    1536:tDZYxPRTe4sJ4JBS9DanycPgfT727qOqdI53/KCY3L3RiAfLiZaK+Q:t+x1e4aE8DMdPgfyqOqd43/VefLib

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\221975dc0a598c5bca12d74713845002_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\221975dc0a598c5bca12d74713845002_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\windows\SysWOW64\net.exe
      "C:\windows\system32\net.exe" stop wscsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
          PID:1796
      • C:\Users\Admin\AppData\Local\Temp\wmplayer.exe
        "C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"
        2⤵
        • Executes dropped EXE
        PID:2268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\wmplayer.exe

      Filesize

      53KB

      MD5

      bbb8e4b79a6b3b4959623c739067b6e2

      SHA1

      33ec64c8d38a6b01e312c2dd154285a8f2bdd18b

      SHA256

      a980b0adbf455f2eae91ec355506c0df5fd0c871c408b5ea40f0f9fb46975a1e

      SHA512

      5323224b0ad36ea486d323ca94c9a4dc6a487099825f2bf8baa6496993dc28b7845366f0e067bdefe2d161b4cf17f53163634699f53b2755ae33998e2239896d