Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 12:55

General

  • Target

    3075331ad30fa9ebeb21f950dc4032ce_JaffaCakes118.exe

  • Size

    94KB

  • MD5

    3075331ad30fa9ebeb21f950dc4032ce

  • SHA1

    9a22846511edabf0cf9182bfe3cf6f0a42e8fccc

  • SHA256

    ccadec71d575eef856d53520d062d1b60ec152518a70ae3ed4f0fd4d54e8f97a

  • SHA512

    8e7fb7825a1bd9e2e13612e19c7bacb1575a1fd816ed055cd18b080d9632dd6708f2c9770539626e3f8248fdbc3d40ae8825bfd3cc8de0cdaba82486cfd2de4d

  • SSDEEP

    1536:wbO889LGH7zi16xGTtnY1iHxwdyPGLOlGSOB73Uq7PcQPKrJq+XhL:wa88dGHyYDUGrSm7H71PKlV9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3075331ad30fa9ebeb21f950dc4032ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3075331ad30fa9ebeb21f950dc4032ce_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qff..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Qff..bat

    Filesize

    238B

    MD5

    2c5f0f2cbe041f5f1fdfc3847d905cfc

    SHA1

    2e85f597aff0da4e57545fd4b5cfb89b68a248ab

    SHA256

    80082f051a6a8eedf8576dc2f8966113ba5ea64690a9d4bee15c5884ebae6f00

    SHA512

    cff3f776b79b4a4c9b95cc847f12461e2c9338a93447d9f675e4c0094e0c4edd9ac7e356b92d628ebe10dc96d59174bcebcd92a4ce91338eed8d5f2b97160c62

  • memory/1644-0-0x0000000000402000-0x0000000000404000-memory.dmp

    Filesize

    8KB

  • memory/1644-1-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1644-2-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1644-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1644-6-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB