Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 12:17

General

  • Target

    3057f902a6185c42451ff90062fea306_JaffaCakes118.exe

  • Size

    236KB

  • MD5

    3057f902a6185c42451ff90062fea306

  • SHA1

    20e58eb04c628fdf98c2d1251cacc72d17fb3bd1

  • SHA256

    10f830031edca98d451224dd68792fa20f767a04cec2257d12c1f1314b8e6bdc

  • SHA512

    bce38792b0ced72e53082d873416636f2f6635888e1ef1a2d44bbf5f9d580e977fbc73fa2858da418ca132961442e6d7208f1c891cfff2f6e597ef9aa249bf9d

  • SSDEEP

    6144:fcA7yhnTUzDpJRgzhpnwFTb+2ICrYWhesRMyNoCBz8yf3d1sWOjN//IlQXxR/f:kA/whpnwFTb+2ICr7X1+/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3057f902a6185c42451ff90062fea306_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\winkernel32.EXE
      C:\winkernel32.EXE
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2976

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NIUC9X25\gereba01[1].htm

          Filesize

          167B

          MD5

          0104c301c5e02bd6148b8703d19b3a73

          SHA1

          7436e0b4b1f8c222c38069890b75fa2baf9ca620

          SHA256

          446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f

          SHA512

          84427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf

        • C:\Windows\inf\anvaila.inf

          Filesize

          90KB

          MD5

          f7c2ad3d15223dabac97ca3eb161068a

          SHA1

          18b04c1dc97f6a05a34dbc22d34e8305360943d0

          SHA256

          095c11a4caf99865699fa1767aadc0089c264f6a978654ad76f164176158022b

          SHA512

          d1e31491a598646d299472f5279aa09f1227b666c2baab723b311023499e476328559d0abb741ad2381c60ab9c74b71f81f6a9dd3002cd25146758403b9ce3ee

        • C:\winkernel32.EXE

          Filesize

          236KB

          MD5

          3057f902a6185c42451ff90062fea306

          SHA1

          20e58eb04c628fdf98c2d1251cacc72d17fb3bd1

          SHA256

          10f830031edca98d451224dd68792fa20f767a04cec2257d12c1f1314b8e6bdc

          SHA512

          bce38792b0ced72e53082d873416636f2f6635888e1ef1a2d44bbf5f9d580e977fbc73fa2858da418ca132961442e6d7208f1c891cfff2f6e597ef9aa249bf9d

        • memory/1988-0-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB