Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 13:14

General

  • Target

    2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118.exe

  • Size

    54KB

  • MD5

    2c7c9e3707cd93f6686e6eeeb2e048ff

  • SHA1

    c54a29b7459a03e11d7aa47f316317fbd6beb13e

  • SHA256

    8dc9b1940bde632c45c4874a0d7d4dd5fd91fb1ebf5ec6f9203806287c07a4e5

  • SHA512

    1200967d153301cefb4e6f7c69693f10d0ddfd7da1026d7d96631dc6669e1827271aaa179108c459b8df87afd13ed21ab7b278614ad31159cf78df61541a953b

  • SSDEEP

    768:/vkGOpRbqf2UzavC/imh4iHJXAewEDmAnQtnmnN9fKVoXGa7bK4s8:0pRbqfYs4chrd37bK4s8

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118.exe"
      2⤵
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\syswow64\svchost.exe
        C:\Windows\syswow64\svchost.exe
        3⤵
        • Adds policy Run key to start application
        • Deletes itself
        • Drops file in Program Files directory
        PID:2064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2064-4-0x0000000000300000-0x0000000000308000-memory.dmp

          Filesize

          32KB

        • memory/2064-5-0x0000000000300000-0x0000000000308000-memory.dmp

          Filesize

          32KB

        • memory/2064-7-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/2064-11-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/2872-0-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2872-1-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB