Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 08:16

General

  • Target

    29d997fd83a7f7182ab2faed5f3b6473_JaffaCakes118.exe

  • Size

    344KB

  • MD5

    29d997fd83a7f7182ab2faed5f3b6473

  • SHA1

    03a10df596c6d3402254cbc273b19f5f5ea15785

  • SHA256

    c1ab71121fb0a362f9320c03c0fb7f01fbbcde089cffbc977b4cfe83704f3883

  • SHA512

    ca2c0b1780a9a40a195188850e3c87361036df5eb469fe475b6852bfb240d5c4fd4af307144658af020f2fbcbd2ee25dfe2a23a90f5ae2ad354e0df14457c7c8

  • SSDEEP

    6144:2WqWqMY2pwQQuBUNJqAe6V+H5liEStrw1l/wTLTCo1AlgPKxd:cXWwiFA74ZlrYrw1lQTCO4gC

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables taskbar notifications via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29d997fd83a7f7182ab2faed5f3b6473_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29d997fd83a7f7182ab2faed5f3b6473_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\ProgramData\043A6A5B00014973000AEC12B4EB2331\043A6A5B00014973000AEC12B4EB2331.exe
      "C:\ProgramData\043A6A5B00014973000AEC12B4EB2331\043A6A5B00014973000AEC12B4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\29d997fd83a7f7182ab2faed5f3b6473_JaffaCakes118.exe"
      2⤵
      • UAC bypass
      • Windows security bypass
      • Deletes itself
      • Executes dropped EXE
      • Windows security modification
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\043A6A5B00014973000AEC12B4EB2331\043A6A5B00014973000AEC12B4EB2331

    Filesize

    328B

    MD5

    3bd05e37e083cf5febdc55bbae135341

    SHA1

    979677453d5871ba823f2bd8773d4356fe25f7a4

    SHA256

    54177c32c3e7de9d6edd0dc9c746df46b2cd283b6d9594c1e071a5727df76201

    SHA512

    bcc435de2467ce13214e17c10e4e12985bd7ff6f165f62bcc1def12c8bc346d3fa83e677bf195d0175d54e20cf6ea04b38f327d479d7c76e736dcf7fdad9a950

  • \ProgramData\043A6A5B00014973000AEC12B4EB2331\043A6A5B00014973000AEC12B4EB2331.exe

    Filesize

    344KB

    MD5

    29d997fd83a7f7182ab2faed5f3b6473

    SHA1

    03a10df596c6d3402254cbc273b19f5f5ea15785

    SHA256

    c1ab71121fb0a362f9320c03c0fb7f01fbbcde089cffbc977b4cfe83704f3883

    SHA512

    ca2c0b1780a9a40a195188850e3c87361036df5eb469fe475b6852bfb240d5c4fd4af307144658af020f2fbcbd2ee25dfe2a23a90f5ae2ad354e0df14457c7c8

  • memory/1644-1-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/1644-3-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/1644-29-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/1644-21-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/1644-0-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-13-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-12-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-22-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-11-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-32-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-33-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-34-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2972-38-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB