Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 10:46

General

  • Target

    28435503f4f2de23e074bf7242504bc9_JaffaCakes118.exe

  • Size

    648KB

  • MD5

    28435503f4f2de23e074bf7242504bc9

  • SHA1

    f455ccda83972e19eec87edd30e38512fceae549

  • SHA256

    22a22ade4c75a0945250a6bd90ce7b0e91f42c04fa595a6ed0482a763c09b3d8

  • SHA512

    bb94801ce18afdb4f8af059e49426c47a6ed41ffb1f6b89111360fe1158233d6505071b832fd111d826889749eee931ee594ae6badda517950768326a2fc7464

  • SSDEEP

    12288:UsAL/W5L/SZdSCvTF+bDTqXTa7v5ouB1CWrDDU1zFI9vAYkCLdHikTlBfkjP:UsW/WNSZ8CLGETEjrCwDUFMhzLM

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28435503f4f2de23e074bf7242504bc9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28435503f4f2de23e074bf7242504bc9_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\concp32.exe

    Filesize

    650KB

    MD5

    b73e69145816aef96a726b3fd53fab89

    SHA1

    757a841b45bd9f5f954bbe022fa675eec0a5f2f9

    SHA256

    8aed8108bcf0b8a39ff598acabd351454ea6ef7065711e7080033b4de48f26d1

    SHA512

    019fcb37a009242090ff89b2a87f9ece776ea9fc3ac29a48a4a423ffac09b8a0d1b19d1918aab25edf0ebc908549e2d93f75944e30029866598dcfbc6eedfab4

  • C:\Windows\svchost.exe

    Filesize

    652KB

    MD5

    a15922bdf23fc1e8242758d2d26bdc14

    SHA1

    6df005da8b89911639875cc3f8ae42c468217997

    SHA256

    1ead4d2054ea12f107e51e828db4675f3317676a79c783b6a3b89630991c66db

    SHA512

    d64acdc8c6fc88ea8c1917836c16c1394662d5f1119fad7a9e66bd737910feaa99021d6a2cdb99c704c950c48fedf34238b8c36604e696bd6d74e5d600f1c5ab

  • memory/1120-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1120-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2120-15-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB