Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 10:14

General

  • Target

    2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe

  • Size

    392KB

  • MD5

    2ff5ca3e7759afb743f4e57c9a825451

  • SHA1

    d7f37c0a3a3e1514ef85646726aa7795fe536860

  • SHA256

    95efec2d76ce181a538501eaa8d842b8fcff9562c038b4bfc2c79ec9785de26f

  • SHA512

    3ec7ef42944468ad23d016a2502b6e38a33e656deb77105e04876fc0013563116b6a77c3c38fa4e5e48156ab5a5a6e357f80fab4a04e0722d8b222b476996c39

  • SSDEEP

    6144:48DIpZ8df86s0iC5sMwQ3BT+iNNJajBaiOVMIIy360VNJ9kVclv:4ZpOfqC5sNQRC8HajBaLMobVNJ9ec

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\ProgramData\aE31004FfEnB31004\aE31004FfEnB31004.exe
      "C:\ProgramData\aE31004FfEnB31004\aE31004FfEnB31004.exe" "C:\Users\Admin\AppData\Local\Temp\2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2840

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\aE31004FfEnB31004\aE31004FfEnB31004

          Filesize

          192B

          MD5

          722b0f0f7809a761ea8a438251eb7b72

          SHA1

          4c0b164611010bbea8c98d9b0d8344cd85ed3487

          SHA256

          1b8a14831d87623f55cbfe63a94425a0c0c060f50b3939da16f44761f14d69b2

          SHA512

          595ba0d9278e7e336e39cf8e82e306270ef3fa32812c384cd97a49d95df56753b6c6de5970efe5bc155b9c733bdf724d534e786beb776af8749526ca996fca3a

        • \ProgramData\aE31004FfEnB31004\aE31004FfEnB31004.exe

          Filesize

          392KB

          MD5

          93a8a4d79456fc2e6b508b5f0fcf0c6e

          SHA1

          8fcc7b93f516bf7f0a9d29b42b80c27c0bbae30f

          SHA256

          e220642668986d99a84bbe9b400ff0a079edbdf2c214445c02e155044fad216b

          SHA512

          711fb43f58031cf43ae57e8752c7af8d36a77ad78f84d795a81620f7764ba866810e690cd982b066a3b45353143ce97847fbcf89d3ef42d09852659f6494fe97

        • memory/2360-0-0x00000000003B0000-0x00000000003B1000-memory.dmp

          Filesize

          4KB

        • memory/2360-3-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2360-18-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2840-19-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2840-25-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2840-29-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2840-38-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2840-51-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2840-52-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB