Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 20:44

General

  • Target

    26263185370d3950c2550a7462940e74_JaffaCakes118.exe

  • Size

    62KB

  • MD5

    26263185370d3950c2550a7462940e74

  • SHA1

    683f72e330a8b69d1360569c38b8884188bcfd68

  • SHA256

    bf25a507b3956931819dbc7a8e88554e7f1758467244c8604e3fbd3fc8de0db5

  • SHA512

    bf97809b096facf0d675260915dbdf46c618320d39727bd5d0e485a1a3555de111f93407d22de62628970a60ba12ac2f6b30fc09ff6e82c1f41c03274a9c074b

  • SSDEEP

    1536:l43X0dQhLCEQbqsKK7r7YZllMi1afYQOvi1:lT+hLCjFj/G7MnwI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26263185370d3950c2550a7462940e74_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26263185370d3950c2550a7462940e74_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\rwgjgsfg.bat" "
      2⤵
      • Deletes itself
      PID:1716
    • C:\Windows\SysWOW64\spoolsvc.exe
      C:\Windows\system32\spoolsvc.exe
      2⤵
      • Executes dropped EXE
      PID:1420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rwgjgsfg.bat

    Filesize

    244B

    MD5

    6865730efcd662b7164183d67eab5055

    SHA1

    0919cd8a86c1f9df4c50faa088c7081e374e2fb5

    SHA256

    83e5750bb2fca6127a29cd7468d1c0d0f006f29733c089fb35ea760daee69e0e

    SHA512

    8ccbb829813ccf3aa501e76a6f48c9826ca80e9e41ccefc2575c18af39c2f929dc33938a82423c0ccbb21e4447ed6de4f29af69555cb4b1e5d4e8fbfc2fae481

  • \Windows\SysWOW64\spoolsvc.exe

    Filesize

    62KB

    MD5

    26263185370d3950c2550a7462940e74

    SHA1

    683f72e330a8b69d1360569c38b8884188bcfd68

    SHA256

    bf25a507b3956931819dbc7a8e88554e7f1758467244c8604e3fbd3fc8de0db5

    SHA512

    bf97809b096facf0d675260915dbdf46c618320d39727bd5d0e485a1a3555de111f93407d22de62628970a60ba12ac2f6b30fc09ff6e82c1f41c03274a9c074b

  • memory/1420-24-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1420-26-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1420-28-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1420-29-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2364-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2364-1-0x0000000000401000-0x0000000000421000-memory.dmp

    Filesize

    128KB

  • memory/2364-25-0x0000000000401000-0x0000000000421000-memory.dmp

    Filesize

    128KB

  • memory/2364-23-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2364-22-0x0000000002F20000-0x0000000002F59000-memory.dmp

    Filesize

    228KB