Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 11:01

General

  • Target

    301b77404f80b009c13d5fc2cf1a94cf_JaffaCakes118.exe

  • Size

    97KB

  • MD5

    301b77404f80b009c13d5fc2cf1a94cf

  • SHA1

    3c599a1e5db226483c664f8de583ca92982857c8

  • SHA256

    92439f1734e97c05b3d9bc20f4e2d5817c0c18aed349bdeda8b58b5b4ab15ab8

  • SHA512

    bb99bc4158556ff434618bf7766de450e9199bc1a013aa2168f1c3846de2f44aca591d2f159c00d1d69c51fdb3132a938d35fce481befdf83d98ec850d864a5a

  • SSDEEP

    1536:Ge+g4GT9TJvO5K+d5sn+sewCPHEWf6E+MHpBC/z4toaf1000:oH+9NvQxdK6wCfEC4MHpk/zcf1n0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301b77404f80b009c13d5fc2cf1a94cf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\301b77404f80b009c13d5fc2cf1a94cf_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\301b77404f80b009c13d5fc2cf1a94cf_JaffaCakes118.exe" >> nul
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 6 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2004-0-0x00000000003F0000-0x0000000000430000-memory.dmp

          Filesize

          256KB

        • memory/2004-3-0x00000000003F0000-0x0000000000430000-memory.dmp

          Filesize

          256KB