Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 05:40

General

  • Target

    2b2c5ba13382ac6c213b8497a051818d_JaffaCakes118.exe

  • Size

    151KB

  • MD5

    2b2c5ba13382ac6c213b8497a051818d

  • SHA1

    a4917fda2a8f635d7d3217111572e13cefd3eda1

  • SHA256

    15120ae7342cc4e96d48363eb789c5758c647636fa4045f16dc9ef34d45a1164

  • SHA512

    ed1892d2e49362cc01d3e10b5893bd1c935f7c09776e3ad6ceac1edb0d031d0fa3659b29ccdc0d5f19be82557c50fd36ce541460261e529180a21eed1d6b911b

  • SSDEEP

    3072:RtXZmJ1ERSEQikmvRTg4NvZmJ1ERSEQikmvRT:RnqEY9cEcqEY9c

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b2c5ba13382ac6c213b8497a051818d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2b2c5ba13382ac6c213b8497a051818d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s scrrun.dll
      2⤵
        PID:2060
    • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2416

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      d70d99f389537cc1e15ba48a2ba326b7

      SHA1

      437d934e244d484d9a1e793c7d21384ff217965a

      SHA256

      e5ce8f0f595f569ac12df0dd75844082b57dfcdf6150008b070dae0622bd0550

      SHA512

      6825a375c9a5267a8c9e4b175d7f611a343b20ee5b213d43a7948e67f5c910776e0388ac13e14b5e9f4ad396c08ccde2f92aa6289067091c83dedb3853050a5e

    • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

      Filesize

      1KB

      MD5

      48dd6cae43ce26b992c35799fcd76898

      SHA1

      8e600544df0250da7d634599ce6ee50da11c0355

      SHA256

      7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

      SHA512

      c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

    • C:\Users\Admin\AppData\Local\Temp\2b2c5ba13382ac6c213b8497a051818d_JaffaCakes118.Axv

      Filesize

      151KB

      MD5

      2b2c5ba13382ac6c213b8497a051818d

      SHA1

      a4917fda2a8f635d7d3217111572e13cefd3eda1

      SHA256

      15120ae7342cc4e96d48363eb789c5758c647636fa4045f16dc9ef34d45a1164

      SHA512

      ed1892d2e49362cc01d3e10b5893bd1c935f7c09776e3ad6ceac1edb0d031d0fa3659b29ccdc0d5f19be82557c50fd36ce541460261e529180a21eed1d6b911b

    • memory/2416-7-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2416-8-0x000000007371D000-0x0000000073728000-memory.dmp

      Filesize

      44KB

    • memory/2416-133-0x000000007371D000-0x0000000073728000-memory.dmp

      Filesize

      44KB