Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 00:52

General

  • Target

    241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    241499c2b0f2f6eb6ffe698cd2ca71d8

  • SHA1

    048d1d9184c0f0f1ad5a385f7c317113f89a4cc8

  • SHA256

    cf48e53f82bfd09275c0be4fddafa614cab0d16f940786a364ede4b77b98dc56

  • SHA512

    5b74ebc24dcc3afd90e3a9fde128406d91d9ca8701934b6abf8d7fa105417f7f2a9944b3136dda08b9e2215e426a24c1cbdca5cc66aba09319a98ec93ae8da99

  • SSDEEP

    384:mhW/WwNeGOu1IkIuUdn2yXn447wycw9juWdJz4EigzT9J:Itn7Xn4EwKjJz4JgzTT

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\delme.bat
      2⤵
      • Deletes itself
      PID:2992
  • C:\Windows\SysWOW64\2E180CB6.EXE
    C:\Windows\SysWOW64\2E180CB6.EXE -k
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\2E180CB6.EXE

    Filesize

    15KB

    MD5

    241499c2b0f2f6eb6ffe698cd2ca71d8

    SHA1

    048d1d9184c0f0f1ad5a385f7c317113f89a4cc8

    SHA256

    cf48e53f82bfd09275c0be4fddafa614cab0d16f940786a364ede4b77b98dc56

    SHA512

    5b74ebc24dcc3afd90e3a9fde128406d91d9ca8701934b6abf8d7fa105417f7f2a9944b3136dda08b9e2215e426a24c1cbdca5cc66aba09319a98ec93ae8da99

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    239B

    MD5

    03fffe76a9e1896336ef1242e2519dcd

    SHA1

    de30853697b4348e50cc5400517e01bf24ce1519

    SHA256

    bd47c09cd36d94b1e14e0150b459a1f4189858ba438c3227ce504c6f250cf12a

    SHA512

    533f2f6fb5f1fad8b83bb712c6bdc8c5955e5aeaa79f86dd335dc67c80cbdd4780d0fb9425642e0e35b32e03cb80f9c956e2394701ef4606f54ff014acd1ac84

  • memory/2196-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2196-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2196-15-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3048-4-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3048-8-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3048-17-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB