Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 13:37

General

  • Target

    2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    2288e3ac2f3c9ce2b6d7feabaed03755

  • SHA1

    a1ecddd97f87a5541943e839875eea687fdf7392

  • SHA256

    bca0512297bc9f94edf7995885d2b3604c535c8c9e6f0ab8a452dbfa0bfbbf1c

  • SHA512

    46cc90c1cf0d6c21ce37c917e27fe24306900932b8d2c553d62dff5d4a892cc54933dec4d68536033b1c0e7505e2ce568970c4fb1d1d37c98f4f1868ebf08049

  • SSDEEP

    3072:BIgv3rilU9S3BJoMe+261zwrF56SxSvM+sUwStS:BRb63ReFGwx56SsvM+sR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\rasEventdlg.dll", QuickcfgSvcs oleWeb90
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\WinPath32\usrPadWan.dll",QuickcfgSvcs AsyncEventIde
        3⤵
        • Loads dropped DLL
        PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rasEventdlg.dll

    Filesize

    132KB

    MD5

    4b54c0c2c843992045344fea9558c5d4

    SHA1

    9c502b47faad39ded674c80b3b65d0be69f2d536

    SHA256

    142794326256a6df8ff72e405f3f0a781eb6765df8ecccb07a342d6af59ede34

    SHA512

    7360355d7a7fc240d236d71a362d49233b7e6ea9b05cb6e29d222bf8654bb29108dc025eda719dc964b1f219b85cf91eef00885ee18e1501672ae62a169f38ba

  • memory/1868-7-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB