Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 07:18

General

  • Target

    2516267ae2a78d826fbcb2c361c99c09_JaffaCakes118.exe

  • Size

    163KB

  • MD5

    2516267ae2a78d826fbcb2c361c99c09

  • SHA1

    cc7f2e262ad68c9b1c2316b77a67a3e50bd718bf

  • SHA256

    70b427374aef9b5bd59cc771b8abc23fabad2ea6e58a6823f28c739f7a86f675

  • SHA512

    48d2a52efb0fd16a5aaa050283ebc7bb0079737aae065a7eead4ebc7e4f49d43edaa0bd73c733636fee54b279aa69fb9afa4601a9457392fb9e2c64f2990c205

  • SSDEEP

    3072:Ltf18giGtpKIlgTDEfuIEzRdrZ9r8viQ09CmD:tqIlgHEfeZX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2516267ae2a78d826fbcb2c361c99c09_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2516267ae2a78d826fbcb2c361c99c09_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe
      C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe

    Filesize

    163KB

    MD5

    2516267ae2a78d826fbcb2c361c99c09

    SHA1

    cc7f2e262ad68c9b1c2316b77a67a3e50bd718bf

    SHA256

    70b427374aef9b5bd59cc771b8abc23fabad2ea6e58a6823f28c739f7a86f675

    SHA512

    48d2a52efb0fd16a5aaa050283ebc7bb0079737aae065a7eead4ebc7e4f49d43edaa0bd73c733636fee54b279aa69fb9afa4601a9457392fb9e2c64f2990c205

  • memory/2732-0-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2732-1-0x0000000002150000-0x000000000227D000-memory.dmp

    Filesize

    1.2MB

  • memory/2732-2-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2732-12-0x0000000002280000-0x00000000023AC000-memory.dmp

    Filesize

    1.2MB

  • memory/2732-14-0x0000000002280000-0x00000000023AC000-memory.dmp

    Filesize

    1.2MB

  • memory/2732-13-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2908-17-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2908-18-0x00000000008C0000-0x00000000009ED000-memory.dmp

    Filesize

    1.2MB

  • memory/2908-19-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2908-20-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB