Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 13:38

General

  • Target

    2289bd4ac5da0afbb734d2d8aab933b7_JaffaCakes118.exe

  • Size

    30KB

  • MD5

    2289bd4ac5da0afbb734d2d8aab933b7

  • SHA1

    83bcb67e5c5a7def9010eb9592f2ce4f621571e0

  • SHA256

    395317448d8d6e65bfcaae02a963bacbece2402c002b548765dedb7c9ea8f56c

  • SHA512

    580ea7440c58590e1fe1d17239b22a81485ff38e39c59343bb0d68021171d5a0bd9477bb713916c178006d279f5e3473c7a827944b202e469fbd2258e49e19f4

  • SSDEEP

    768:4VTsxfSjwC7On2qcQk7GW6OyOzhUG1nbcuyD7UONm:w2LB2R7yOzqG1nouy8Sm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2289bd4ac5da0afbb734d2d8aab933b7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2289bd4ac5da0afbb734d2d8aab933b7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\259397526.CPL

    Filesize

    12.1MB

    MD5

    1c75cc7f0447939b32adcc46077acf3b

    SHA1

    a9cbf03add11ab7b1428e70bf97c08757ba1b820

    SHA256

    b9572f7dca1d3d7b74b7a337041a65c982c7ca35d6a12b32473ff1c6119458b9

    SHA512

    e4d74f465a47ac737d47dbdd08a8d9b8779b6ff18f2f2a43d7774e5b8bf6312f87c249d5205b6a52670dd152c8b59c5bda08c75b6d0ca4bdad127e80a6b75be3

  • memory/2648-0-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2648-5-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB