Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 05:26

General

  • Target

    2b22582e7a1387cd7ac75e214049886e_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    2b22582e7a1387cd7ac75e214049886e

  • SHA1

    01daba3b01ba182f549e28cf9b11afda975e56e8

  • SHA256

    4a3b8b3cc5c78af971470b45c4e49a7dbf01af80039b7c7db6f6c2913994e235

  • SHA512

    35065d53c71c95ae6843567f4c763c0f87e80719beb3458c357845b002a72f2213b3af7271abcec9f0671d8444bd56970dbcb34f3e31950f9f13b2fa92179d47

  • SSDEEP

    3072:Ga5Xf+Dxj95Fbr2IsJ03CwLYwR49hPLd3BzK02Swq4lV34oQZiEh8:z5v+DbbrTw03rLlR4PLnh7w1rZWM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b22582e7a1387cd7ac75e214049886e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2b22582e7a1387cd7ac75e214049886e_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\roehua.exe
      "C:\Users\Admin\roehua.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2076

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\roehua.exe

          Filesize

          160KB

          MD5

          8fc9f1bb4d708b3a61a9fe081db5756a

          SHA1

          30b9378058effd07e4f1f9d7ad286d596567e9b0

          SHA256

          ff89b6a1dd5ca9bc24a37de2581e8edfec945ab17b26f09c8600b9897c049d42

          SHA512

          d2657517d8d1d0c6a470034febe3c272b1738f235d92296828e6d65b5988612d8af811ec76d56ad5728665bde267a538ecbd7dfca70177cdee50baee3ec79e82

        • memory/1420-0-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1420-13-0x00000000027F0000-0x0000000002818000-memory.dmp

          Filesize

          160KB

        • memory/1420-19-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2076-15-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2076-20-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB