Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 14:03

General

  • Target

    2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe

  • Size

    98KB

  • MD5

    2ca193572cdf69e9446be0eb8389f801

  • SHA1

    579987814ddcb4acb9b4044800a5acbc61ca5765

  • SHA256

    f7c0dbd6b7ef196492e47779a7d53485b3b22f671c7689220e2706df6059c462

  • SHA512

    2a7edf0c4eae00731a502b289309e37a2df56b4f83e76fe6149aee41bbc440e049ff015982557ab6c37bd6f3a595203707f49a8abec85aa2d7c5d48db7f40808

  • SSDEEP

    1536:qq7hjiLjBmD4TBCs8Zrrugwz8AsBC/z4toaf1000:qGhjWjBmMTBCs8ZnuJsk/zcf1n0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe" >> nul
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 6 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2708-0-0x00000000003F0000-0x0000000000430000-memory.dmp

    Filesize

    256KB

  • memory/2708-3-0x00000000003F0000-0x0000000000430000-memory.dmp

    Filesize

    256KB