Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 16:09

General

  • Target

    28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe

  • Size

    155KB

  • MD5

    28c5acfab1b4e99c5d77351b9b370aaa

  • SHA1

    f83409a48a00d169e10af2297faac02cdf782f0c

  • SHA256

    080c44bbf72e4d094d7584b366a3ef49f71bfdad33fac5d19873bf687feb5505

  • SHA512

    e7ea8d564b225d4cb9999882136931f4c422b02370508aa007ae4369005fc13b45007ecb13dcacd822612f3c891571e7eb0c4a7a73c234ffd6474985eb2cd174

  • SSDEEP

    3072:zjAsOEnnWUYDOrpG2Lc13n1AM/wXyJqjUzpZBM8naKFM4:9bG2LclxJGiLBjHl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\Wxibaa.exe
      C:\Windows\Wxibaa.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2252

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

          Filesize

          390B

          MD5

          47ea9d752f4c14513f58d472967f390c

          SHA1

          28f8a9801f582b5164f8e2198368087f9fb6d404

          SHA256

          bf3ffbb58872befbd70b7ed649940e6325ae50374fc443038ea7581fd96f26db

          SHA512

          bc16ad1ae68e283d61e8d0239bdd5734f71f261068271830bdcb324bddfbdd1a7abe5df6d45d446d250c2f3f4300c8528bb9449e6252eb3fca35d76731112e42

        • C:\Windows\Wxibaa.exe

          Filesize

          155KB

          MD5

          28c5acfab1b4e99c5d77351b9b370aaa

          SHA1

          f83409a48a00d169e10af2297faac02cdf782f0c

          SHA256

          080c44bbf72e4d094d7584b366a3ef49f71bfdad33fac5d19873bf687feb5505

          SHA512

          e7ea8d564b225d4cb9999882136931f4c422b02370508aa007ae4369005fc13b45007ecb13dcacd822612f3c891571e7eb0c4a7a73c234ffd6474985eb2cd174

        • memory/1664-2-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1664-0-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1664-1-0x00000000005D0000-0x00000000005D1000-memory.dmp

          Filesize

          4KB

        • memory/1664-22812-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1664-48692-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-9-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-10-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-129393-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-129396-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-129397-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-129400-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2252-129404-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB