Analysis

  • max time kernel
    140s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 01:34

General

  • Target

    2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    2e8c01b600871b96dc93153c151535aa

  • SHA1

    1fda4fc1f7d3ba727b9aec648a793b0784fa373e

  • SHA256

    cfcc10ca56c34c60869898fc8b4bbc204eead0b32836333a4e860720cbd5b62d

  • SHA512

    ac1ac063bbc39a26b361b19a202973df4c66ad39d26d855ab8bc21a8e0e6403f8c3625ad538a88b3d1a95f4b79386a332bffebaaeef19c045c3ecf8adad4bf58

  • SSDEEP

    384:UfnOG4WkYbPyrwMX8YhP6UYDTfjlZpuYra6/5:4OjlwMX8YhiUw/L955

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
      2⤵
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
        2⤵
          PID:2916
        • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
          2⤵
            PID:2496
          • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
            2⤵
              PID:2320
            • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
              2⤵
                PID:3024

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DUC20.exe

              Filesize

              32KB

              MD5

              2e8c01b600871b96dc93153c151535aa

              SHA1

              1fda4fc1f7d3ba727b9aec648a793b0784fa373e

              SHA256

              cfcc10ca56c34c60869898fc8b4bbc204eead0b32836333a4e860720cbd5b62d

              SHA512

              ac1ac063bbc39a26b361b19a202973df4c66ad39d26d855ab8bc21a8e0e6403f8c3625ad538a88b3d1a95f4b79386a332bffebaaeef19c045c3ecf8adad4bf58

            • memory/2268-4-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/2320-14-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/2428-3-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/2496-10-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/2916-7-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/3024-18-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB