Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 17:40

General

  • Target

    233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe

  • Size

    413KB

  • MD5

    233992fa2ca9ebc32d8eff143f157d76

  • SHA1

    ebe38a6f6c1863b33bfcff432d2e28f1365ae316

  • SHA256

    4bd6f8ff89484107ffa62e723bf2647102397e62ccd1c0ea6c0e80c53fdf89a9

  • SHA512

    bca93461de3e404d57332dd7851125f63adbd3913805dcfb8dfddef71afc527f6624c2031ffbae771278d349dd386451ba573eca69e34ef2d8ce9626b9327b56

  • SSDEEP

    12288:a36ok57VUdZTL5S3pJ21iFspPOK5eiB23+7Hb:a3548Dbp2K0aW+77

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe
          3⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1640

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exe

            Filesize

            156KB

            MD5

            a1435734641178734d320cf019b6cd94

            SHA1

            1dec60fe68cca4628cd8c7efe6fdabb018a863e5

            SHA256

            b084b345f1ba0ec2beccfd7c74d711c88997d76b0a4f084172d2c496f5b2e15a

            SHA512

            88debe3c7c99365477c0e215b55f3dbd89cc6f8fb023b9594ac3ebb2ad89524a31acc733dbde08b8ad8f1a5b9013e9359ef772f9b61990852de948427c71f36f

          • memory/1188-41-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

            Filesize

            24KB

          • memory/1188-34-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

            Filesize

            4KB

          • memory/1640-37-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1640-32-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1640-33-0x0000000010000000-0x0000000010011000-memory.dmp

            Filesize

            68KB

          • memory/2444-23-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2444-11-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/2444-9-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/2444-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2444-13-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/2444-10-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/2444-12-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/2444-16-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/2444-20-0x0000000001000000-0x0000000001036000-memory.dmp

            Filesize

            216KB

          • memory/3044-1-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3044-18-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3044-7-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3044-3-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3044-4-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3044-2-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3044-0-0x0000000000401000-0x0000000000403000-memory.dmp

            Filesize

            8KB