Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 20:47

General

  • Target

    26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    26278fdf84de6c70e3bdf38233f955c5

  • SHA1

    a672877466e3d211232f40f5888878a5adb74de8

  • SHA256

    ae78931209d78f07d76bc36c4b468c36f4f42163ae5dc2717274a94abc6b3004

  • SHA512

    2efdd383148258166e2cbc067d7fa3c27dde7cea3a470e24573708b882fb613ae62668c0338c23b8ee4f99b2c4809934c9a2d5391ab7d1d6268c5c138d2fbd3e

  • SSDEEP

    3072:BIgv3rilU9S3BJoM+6GeX9yOx84NabZs/5YwPTeAp5f:BRb63R+xM9vxTa2zK25f

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\QuickMobileNotifier.dll", kbdWebspl confWIaudio
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Desktopcfg32\odbccfgPort.dll",kbdWebspl d3dMouseTask
        3⤵
        • Loads dropped DLL
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\QuickMobileNotifier.dll

    Filesize

    132KB

    MD5

    22ab315451e84d7086cd82886739e21f

    SHA1

    27d9977c025c540a9858fb4ec8175d22a0c981be

    SHA256

    7c3549e22cb296792b522841d3d7c925ac9356dfcaad2fbabf590eda9ec44c12

    SHA512

    9ec862f3f7553bb76d68d1f081b33f564e5c81d8fcb97813ca5dffed466bb51f834240f3bed4454774ea8008f7010642555f5458f3768ba17c9676b317e751d8

  • memory/2932-7-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB