Analysis

  • max time kernel
    149s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 21:45

General

  • Target

    2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe

  • Size

    56KB

  • MD5

    2725a576a0776c900e67b6e88ffe5f15

  • SHA1

    555b19207ee93a6fd3d23899ebee5da557b3c449

  • SHA256

    db34177e41e2507aaf4af20d7c770f992e9747d14ecd2ef441b94a051a3be804

  • SHA512

    c66d5d7c7c0e9b8879bc317060ef29f5c4d43ccd7094188e66743f610256718c0d2e5eee76e2e6cbc6e2ce7d5c4e5cbda0dd2a616b702580c94f91d5bccdaa5b

  • SSDEEP

    768:v6C45EC6O5EnWHhLS0ikw/F6TckEt6bzGOj/gW:xfoCMudkwYmt6/rg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\csrcs.exe
        "C:\Users\Admin\AppData\Local\Temp\csrcs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          4⤵
            PID:2960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\csrcs.exe

      Filesize

      56KB

      MD5

      2725a576a0776c900e67b6e88ffe5f15

      SHA1

      555b19207ee93a6fd3d23899ebee5da557b3c449

      SHA256

      db34177e41e2507aaf4af20d7c770f992e9747d14ecd2ef441b94a051a3be804

      SHA512

      c66d5d7c7c0e9b8879bc317060ef29f5c4d43ccd7094188e66743f610256718c0d2e5eee76e2e6cbc6e2ce7d5c4e5cbda0dd2a616b702580c94f91d5bccdaa5b

    • memory/2268-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2268-0-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB

    • memory/2268-13-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB