Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 08:37

General

  • Target

    2bad061f136a08d82ac9f1ebdd60f3ed_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    2bad061f136a08d82ac9f1ebdd60f3ed

  • SHA1

    c04e4ade66f27b06a10be3fd41df09a9545f72a6

  • SHA256

    0d97ed4e92ab67c725b45d9f21d7d0fecb7d08cbe91ca6164bf9166c017dd592

  • SHA512

    f0bbe5977f26e5cc4f06b9ff6643eb87bda563bf288e0b5fdda2393f8960cef8d16c37598fcaf6a2f68b64075626bc1367806d791ef8bd7264784b95345c099c

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN8B0:Dv8IRRdsxq1DjJcqfNC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bad061f136a08d82ac9f1ebdd60f3ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2bad061f136a08d82ac9f1ebdd60f3ed_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6ada5473e476a9b0fc0602917420c48

    SHA1

    392b2fb0f40caca2e58591da54c7d64914df8d0d

    SHA256

    7bafb17cdd95224c779acb2239e7e096e07324096878330f76d915e9cb1b9b4d

    SHA512

    82fbccba8e8ff53f021792a42cd373d5e054b69d87bbe55f8fb8a249d6d9a3bfa6b71f7ce7e901c187fdc3f4ba9ab8da3695ac7796d907ae9a230bdaf51290b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5005564c2e6e2989986aae598548fda8

    SHA1

    f05035053a17944363502c772e9d1124367aa6e5

    SHA256

    25ce649c24cdec144e0deac88239cb5fee5c747923ec503fcdcb0ccda25fecc7

    SHA512

    63f54a6b276e5353cd497319124e405af47e946323feba514c04387ad64727d48a7ec307c60913ac4f4a0350e95bf38dae3bc04df2f12e01d1165be631db362c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JQ7VMQEC\CCXCQUBE.htm

    Filesize

    175KB

    MD5

    e82fee788f1fc3b0564728990483c6b8

    SHA1

    5a9b26a7ad8782bb242bba3b3a5bf2bf06d632b1

    SHA256

    88b8d108b3be91714a680c2e9fda0b693e3afbb67ec8a25fd0f6ea0dee159eea

    SHA512

    9a3e4fadc82847de9b9260fd0bd93a4da5b6fc13aa9be3e17bcbd2d77641ed18f9262c0955a1ddba6d0bc5225fbf41efce56d4fdcaa1a986db395f1c28fe545a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SPRIFH8L\search[3].htm

    Filesize

    129KB

    MD5

    6a1360cff47e3f10d48642ee6da3f137

    SHA1

    b5005e9fd0ef7e3adb1c6fa3a8f64250bcc4857e

    SHA256

    c2da898524fa4db4d9fea8a5ba3d2564fd0e2eb309c6c6eee87239dba29d909d

    SHA512

    8111fa1c95743ca722ae10ef3171f67fa9d0db547616b7b4dd9d6c59118e6d7bd85d909cb06ef628400c8ffbe0eaf9d7ae17a54757668fa0ecb29f521f2de9a8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WK27LCMU\search[1].htm

    Filesize

    130KB

    MD5

    e95381a8bc44508d6a1454ecdab1fc86

    SHA1

    57b153268ed38d366c92a5f4f12a0a57a25c3e00

    SHA256

    424e051bbbd8bc3d717a3db0d6330762f98446fccb777d190edd229577095029

    SHA512

    d552c85ccd694ce6698166cdcfce7b0dee31c020c23983cd466c21ae641226d79998b0a95fe3b41f76c6bf34cd632a397c0ee6d42222aa293043bec7e2d908e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WK27LCMU\search[3].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\CabFC70.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFD1F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpF94D.tmp

    Filesize

    28KB

    MD5

    34ed4c85775a7b29bde2a216dc1f5cde

    SHA1

    c20b6f0ad57ecfed1fa71963766b3f1244d75391

    SHA256

    93024c2b77be44eb99d3ed145fb1c7141731f4a5d00fff746dba8339b3daab9b

    SHA512

    2fc988d55cbbf3a0fa5c511fa44cd976a0f03917f0dd092440370d6a41714803c363fbb403a51bed8d3277319747193be20c64e85dd8d902f0ce9b37ec65610f

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    045a0dde04da462b3d8d2ac5ff6679d0

    SHA1

    eb30eb38f31cdf02c060f6ada86d79a634b63315

    SHA256

    e79236de8b4b07885381c387b7af1a4600641a30a9312401601be4dae27ce0e5

    SHA512

    629b19bcc3ea869d0fa7b77ee8f5e96ff4210f068d5b8e7d44ad93e2d408b3083f3c93979c1009054fbcb1e2855403ae1f711c67879a0cc8e7e9a1586e62efbc

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    b4831ecbe85a9447fd4a5884392974cd

    SHA1

    44bfe91edf7e619b70b8edb3630e2bd7649d20ea

    SHA256

    c3dfe414948f2c20be45a22fd4a54cbf3ed75711beaa1078f95e784dec3daa2c

    SHA512

    22bcb02b2bc7d8094a87309f36732f8c425a65c8226e99d8a6b914ca5b29a7341bd3bb87a4f9d831e3d8f1249a4b580b8de2a2177d9620cc139e602827414b9e

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1960-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-368-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-58-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-308-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-65-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-82-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1960-77-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2348-81-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-71-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-25-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2348-24-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2348-64-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-2-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-76-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-9-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2348-10-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2348-307-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-59-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-57-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-367-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2348-31-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB