Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 10:37

General

  • Target

    283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe

  • Size

    327KB

  • MD5

    283f49e1e7af1107ce1fdb3e62815026

  • SHA1

    530230d0caede75419be075691a37b3295a6b9ae

  • SHA256

    dab5d49baf62b43b7f95df3f0e0070a42975f0239fc3e2e2da161b00540927c6

  • SHA512

    7558ae9bc436d8775c7610d96670eb6854771b51a120d5d472ba2bc5daeb4cba2361c50ae3c674e3e51dbeea3c1d1678dfb69a879c103b97dce6aa24e8926e31

  • SSDEEP

    6144:AdHFCf9vsBqU8cCK6Taz6u/eHu+QqKTSs6Nj81YFrec:QFTBqU806OzMdaSsKFT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1104
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1208
          • C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\283f49e1e7af1107ce1fdb3e62815026_JaffaCakes118.exe"
              3⤵
              • Loads dropped DLL
              • Modifies Internet Explorer settings
              • Suspicious use of WriteProcessMemory
              PID:1900
              • C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe
                "C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2656
                • C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe
                  "C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2636
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpef55b5b3.bat"
                4⤵
                • Deletes itself
                PID:2564
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2252

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpef55b5b3.bat

            Filesize

            271B

            MD5

            31d4a02dd2f3f123fa6998767262f02f

            SHA1

            af28bdd26b04e1efaa011f4cf672c9983a94ce3a

            SHA256

            7f5ad651f4d590131457d1676904aa0e02ae8a8b4d35b162084e872a7c49c36d

            SHA512

            b55f92441d3d301fad27d56f7c3ecec6334a5d86509ca50156a89c2d6aaf674c7fffac2a68d856043df1784787255814a5e61bc87075a2a4e5887c245bcab6af

          • C:\Users\Admin\AppData\Roaming\Geroby\otykca.exe

            Filesize

            327KB

            MD5

            3c113644a1821806d552b1dd975ce7af

            SHA1

            d4069600603b0c006bd310d2f3fb68c2010f4496

            SHA256

            20e26fbc5a16c57078041d157fed3e88b5035cb4778d2f964957c39e23eede5c

            SHA512

            a8680936779bf7e5f6cb85dddbf415b13fcae984ac03ea82a973dc7755140ba69ba5fabe81d6d9a07f3788c3154060521e1087c1211979f82dd0c88665dc2171

          • memory/1104-59-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1104-53-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1104-55-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1104-57-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1180-63-0x00000000001B0000-0x00000000001F4000-memory.dmp

            Filesize

            272KB

          • memory/1180-64-0x00000000001B0000-0x00000000001F4000-memory.dmp

            Filesize

            272KB

          • memory/1180-65-0x00000000001B0000-0x00000000001F4000-memory.dmp

            Filesize

            272KB

          • memory/1180-62-0x00000000001B0000-0x00000000001F4000-memory.dmp

            Filesize

            272KB

          • memory/1208-70-0x0000000002590000-0x00000000025D4000-memory.dmp

            Filesize

            272KB

          • memory/1208-67-0x0000000002590000-0x00000000025D4000-memory.dmp

            Filesize

            272KB

          • memory/1208-68-0x0000000002590000-0x00000000025D4000-memory.dmp

            Filesize

            272KB

          • memory/1208-69-0x0000000002590000-0x00000000025D4000-memory.dmp

            Filesize

            272KB

          • memory/1900-18-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-29-0x0000000000370000-0x00000000003C7000-memory.dmp

            Filesize

            348KB

          • memory/1900-1-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-3-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-78-0x0000000000370000-0x00000000003B4000-memory.dmp

            Filesize

            272KB

          • memory/1900-82-0x0000000000370000-0x00000000003B4000-memory.dmp

            Filesize

            272KB

          • memory/1900-83-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-81-0x0000000000370000-0x00000000003B4000-memory.dmp

            Filesize

            272KB

          • memory/1900-80-0x0000000000370000-0x00000000003B4000-memory.dmp

            Filesize

            272KB

          • memory/1900-79-0x0000000000370000-0x00000000003B4000-memory.dmp

            Filesize

            272KB

          • memory/1900-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1900-11-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-84-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1900-7-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-190-0x0000000000370000-0x00000000003B4000-memory.dmp

            Filesize

            272KB

          • memory/1900-28-0x0000000000370000-0x00000000003C7000-memory.dmp

            Filesize

            348KB

          • memory/1900-19-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-5-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-17-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/1900-16-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2244-0-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB

          • memory/2244-15-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB

          • memory/2244-13-0x0000000000320000-0x0000000000377000-memory.dmp

            Filesize

            348KB

          • memory/2252-72-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

            Filesize

            272KB

          • memory/2252-73-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

            Filesize

            272KB

          • memory/2252-74-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

            Filesize

            272KB

          • memory/2252-75-0x0000000001BA0000-0x0000000001BE4000-memory.dmp

            Filesize

            272KB

          • memory/2636-49-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2636-194-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2656-47-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB

          • memory/2656-31-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB