Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 09:19

General

  • Target

    2bcb2e87ef3b5a6733ca461a148cc67b_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    2bcb2e87ef3b5a6733ca461a148cc67b

  • SHA1

    b675259cf6f1ab3620a2b0ccdccf0815b21ffa40

  • SHA256

    0e1f90345b595f9b8d2f42d5c094aafbe789cd3a9642b7d6ad2f0928b8661cac

  • SHA512

    712b4c2bbedb6918d2a1bab5fee32977255350b1665f9a67023ee76d0e0ffb1eb321674528960ee9c5d5a4f8765afe97fd5a0ab95a6c6d3e35fba23416b54c3e

  • SSDEEP

    1536:uE9d9HQ4zxHwxExNy3tQ9CW5EZWHakMwP9W6uXNi9f1AWa11GBPIdRONd+w6EStU:PDHQm0tQ9nLHbB9W+k9ZJgImCHU1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bcb2e87ef3b5a6733ca461a148cc67b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2bcb2e87ef3b5a6733ca461a148cc67b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\siiaw.exe
      "C:\Users\Admin\siiaw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\siiaw.exe

          Filesize

          204KB

          MD5

          df10fa2b83d7c75e735826db40a20777

          SHA1

          0776f2047f5224ebbdf1738b5450d5bf1afe61df

          SHA256

          547ba0cf8da45bfbdfe984cb0e014edd2b73aa0e72731e6813e0e230433940c4

          SHA512

          ad6167e53d4ec5e8219ff816149c5faaf0cf550b8218b623ea9d273caf0d1d1db6dd6751dccbe990463c3acba50dd9cf3ce190572ba6ae51794023ed85790290