Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 18:25

General

  • Target

    2d5f50d7f20236da84822d1b2aedf284_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    2d5f50d7f20236da84822d1b2aedf284

  • SHA1

    50e882772ed5b442c68df8165ac519965f04e5da

  • SHA256

    6f69e60f5429fb9e1a3e5f1ca46da5cd697a9f99db716c6cabbb79bcc2db6876

  • SHA512

    e4efa75993aa03468d54a032b53fba3e5f713a01c04eaf696b2c93a31231c496ea906076c4ad861c3697b3464e986b5cfacc59cdebc883f356b3dc580daea826

  • SSDEEP

    24576:8t6fOpLj/4x6/k00NmTK7NnQ2XFquYHn6AD/I9a85Nnxxr+UJW/0HYQlrSApj:6Bj/h/B0NmTyNnh1XYH6ahKX004QlNZ

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d5f50d7f20236da84822d1b2aedf284_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d5f50d7f20236da84822d1b2aedf284_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Users\Admin\AppData\Local\Temp\2d5f50d7f20236da84822d1b2aedf284_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2d5f50d7f20236da84822d1b2aedf284_JaffaCakes118.exe"
      2⤵
      • Drops file in Drivers directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~temp0815145039.tmp

          Filesize

          12B

          MD5

          e91250ecb3ba181741f1275c1cc4760d

          SHA1

          d78dcb754e1a1c925fac394de68ed8511db9a307

          SHA256

          17b74e77784641b90ec7959de0011d1e2a25a29b194e5d0c97e657320ae01e9d

          SHA512

          1b313bbca82b76b8efff2d9eddbd062d3ce77c5e877e96dda703b1661a3f3d6c35f3d36ae6baaf9502b44080e18dd6e09576475e2bb732a014ed58caacb0c6b9

        • memory/3780-0-0x0000000000400000-0x00000000006D5000-memory.dmp

          Filesize

          2.8MB

        • memory/3780-6-0x0000000000400000-0x00000000006D5000-memory.dmp

          Filesize

          2.8MB

        • memory/3868-7-0x0000000000400000-0x00000000006D5000-memory.dmp

          Filesize

          2.8MB

        • memory/3868-8-0x00000000006E0000-0x00000000007E0000-memory.dmp

          Filesize

          1024KB

        • memory/3868-23-0x00000000006E0000-0x00000000007E0000-memory.dmp

          Filesize

          1024KB