Analysis

  • max time kernel
    96s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 14:50

General

  • Target

    30d198276bfaf9af87d9737f45205436_JaffaCakes118.exe

  • Size

    180KB

  • MD5

    30d198276bfaf9af87d9737f45205436

  • SHA1

    27e045e0502c7d3bd732e5c970ae5990f4c3011a

  • SHA256

    91fd8c45536fc35d7f4bf0c9d4c62b66e6b8127d9fbd08335548bede60dfeb04

  • SHA512

    85d1912489664d89194b54d897d147200b004305a5f0903e81a7ebb378c87a7c7b21b1a3bbb799177e8750eff2cfcdc07315bc6c1428aa666aa0f56bd8af5cac

  • SSDEEP

    3072:MRAhhcsxgAJuK7bZD01GoI0ONtNmlngmx5MODNKUkubjuuyXHb/RS4F:MRAhhJxX7bNIFlJYUvSL/sY

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30d198276bfaf9af87d9737f45205436_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\30d198276bfaf9af87d9737f45205436_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:4884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 708
      2⤵
      • Program crash
      PID:208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4884 -ip 4884
    1⤵
      PID:540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\concp32.exe

      Filesize

      182KB

      MD5

      eb3aab7bdb4c2419cb3d28832368894a

      SHA1

      b7b3e3525f3f726d3eb4de6607ce3d3f6a6dd71e

      SHA256

      911222a431532fecc0188f31ea039bdc15c8c412fcece8fa6cdeb2e78718c4d8

      SHA512

      136b5f8cde0bd132df565475d3261babe4afb70a92d0a22059ca847ff2e20f5dba55c40c0f0acd144b489e34d87a21bc1b7e5e82f8758751f7b7285a288d0c3a

    • memory/4884-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4884-7-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB