Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 19:04

General

  • Target

    236dfce867a49a881be821ed134e294c_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    236dfce867a49a881be821ed134e294c

  • SHA1

    c01f1adf2244a36ba916ba35c26ff9c650b04fac

  • SHA256

    639282522c568d848f1c0d3b689986d694c8cb7dfc602d9ac93c89cc0d66f3e2

  • SHA512

    92132dba16cd9fd84d6aed9d31d66b1f9d863577ea588f32234a287a48a06f148fb008d129c14596c3ddd43fa8febb4a5ef3127aae95de73691604f31a7673f2

  • SSDEEP

    3072:vhOw6tYi5HPOrhLYhRiHi+nklyWxYZXJWTUuEWG91A2/shrS9iRle6G+pAxIbYpN:JOr2rhLw7+ko4iXATUuE21S9isgS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\236dfce867a49a881be821ed134e294c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\236dfce867a49a881be821ed134e294c_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\jaked.exe
      "C:\Users\Admin\jaked.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jaked.exe

    Filesize

    228KB

    MD5

    78b29838bafd9b6af94f68c9d132c295

    SHA1

    fda19cb577ffb7ef05d5e7b1fab906c31ccd5390

    SHA256

    663b5dc87596ab7740c679a3e61bd11af0fb100aa39e9a6603ba4dfd9440e70c

    SHA512

    8d447bef70a4a05d2cf954570e491c1910cd494a546f75edd8fd782c7adb3a695261d1bba05580f25a2c162d136edb3f9bc8f2fff47d86d78ab1278cc901b56d