Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 07:23

General

  • Target

    27b6d72edcaef330dde1686cd2b0fec1_JaffaCakes118.exe

  • Size

    673KB

  • MD5

    27b6d72edcaef330dde1686cd2b0fec1

  • SHA1

    5f0908422f09f6658a3eeb61b21f0678856bbbae

  • SHA256

    c4f417e6242e232857947532f2531cf0a516013a425381072b0d5ec4aae8707a

  • SHA512

    ed3339f76c964b70ff24ecc19899baac9502414c74aee50273365205028d6f8b3b10c72e2dcf8f54249b78d17f3ee9d2758efe38614a4ae33e69f11e43c206d4

  • SSDEEP

    12288:UJZKBfdC0811uH5q9OTmHKh6vWrUwMMNGm9oY+gTnCvGRHygCIGBxw:kZgor6C86vhmNGmf+gTC4S+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27b6d72edcaef330dde1686cd2b0fec1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27b6d72edcaef330dde1686cd2b0fec1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\µØϳÇÓëÓÂÊ¿.exe
      "C:\Users\Admin\AppData\Local\Temp\µØϳÇÓëÓÂÊ¿.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\b.bat "C:\Users\Admin\AppData\Local\Temp\µØϳÇÓëÓÂÊ¿.exe"
        3⤵
          PID:1948
      • C:\Users\Admin\AppData\Local\Temp\ANN.exe
        "C:\Users\Admin\AppData\Local\Temp\ANN.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\b.bat

      Filesize

      57B

      MD5

      fe65bfb88feca5d19f3b8ae10c701f5d

      SHA1

      b19002b7de57d4a9fcc589c85a3b89e401e83552

      SHA256

      dba301be6859924751f4ae249d9fd8930ddfba235b52ccf4848d5c29479bbc75

      SHA512

      252efbf415dd46053e857c2280f9fb401e2b2ec6c400ab543ed11d82c987850d77de1ceeda366f72fe059e49826dfc74f5bb7f6b2a7ed3a9eab77643b5cb003d

    • \Users\Admin\AppData\Local\Temp\ANN.exe

      Filesize

      337KB

      MD5

      678cddf2eb298001cff01572f7a3e7d6

      SHA1

      0b386e2519888907863c5d23c8ecd2b8402d0370

      SHA256

      b80e3ee70f412c684362d65c303c071a910223ca144dcdaea49828ec64206446

      SHA512

      ffa3ad17aab72700a11f7a608cb579fd57609a1258264d9084e5790f3feffc63443f35268143dcfab628c3f5a26a27c07797aeecf01a5218c876fc21c580684c

    • \Users\Admin\AppData\Local\Temp\µØϳÇÓëÓÂÊ¿.exe

      Filesize

      20KB

      MD5

      4ce375bd1f2ff25882a71c7d217bfca8

      SHA1

      bcc4f8f7d96594dd822d3b8023c82fa1eee61c65

      SHA256

      3f7e2c8f328b2fc97781a5fb7282d39eaf2e7b3b8e4cf6de14dfc7d594b94183

      SHA512

      bc9fcd6c3e143a3c8ef17a52ee6d5204ff799fe8b35c820f238a3d9583ec51b67d46bcadd8e3940eabc01f52255c58bf81c21b2562feb4d12a995c8bf56faf9d

    • memory/836-30-0x00000000034B0000-0x000000000356C000-memory.dmp

      Filesize

      752KB

    • memory/836-28-0x00000000034B0000-0x000000000356C000-memory.dmp

      Filesize

      752KB

    • memory/836-1-0x0000000000498000-0x0000000000499000-memory.dmp

      Filesize

      4KB

    • memory/836-2-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/836-31-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/836-0-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/2780-34-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2780-32-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2780-36-0x0000000000300000-0x0000000000355000-memory.dmp

      Filesize

      340KB

    • memory/2780-38-0x0000000000300000-0x0000000000355000-memory.dmp

      Filesize

      340KB

    • memory/2780-39-0x0000000000300000-0x0000000000355000-memory.dmp

      Filesize

      340KB

    • memory/2780-41-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2780-43-0x0000000000300000-0x0000000000355000-memory.dmp

      Filesize

      340KB

    • memory/2780-45-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB