Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 23:06

General

  • Target

    36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe

  • Size

    391KB

  • MD5

    36c42dd50f28aee2acc8a20ebd43671f

  • SHA1

    786d7e7fe330f0d9abb0f6ada971b57030353cfb

  • SHA256

    9bf8a60e76a38b42be7d216073038851dd5d671816c7ff85bfa14a71f220302a

  • SHA512

    e8ec093452d3faacbfaa4febbeb44f3c1a582d42f17cdbd6399507386be140e199ab947c42e8fb9f327e4c56eccd0743fe0e7a69a1f32ef4bd1a9c7aed1a2631

  • SSDEEP

    12288:0tN/P3Zgc2IdOUWz8gYdZwuUYJGmr1xK2pE9:0tNHuiWzid+tYg4K2pA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of UnmapMainImage
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gema\gema.exe

    Filesize

    391KB

    MD5

    36c42dd50f28aee2acc8a20ebd43671f

    SHA1

    786d7e7fe330f0d9abb0f6ada971b57030353cfb

    SHA256

    9bf8a60e76a38b42be7d216073038851dd5d671816c7ff85bfa14a71f220302a

    SHA512

    e8ec093452d3faacbfaa4febbeb44f3c1a582d42f17cdbd6399507386be140e199ab947c42e8fb9f327e4c56eccd0743fe0e7a69a1f32ef4bd1a9c7aed1a2631

  • memory/1720-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1720-1-0x0000000001DB0000-0x0000000001E17000-memory.dmp

    Filesize

    412KB

  • memory/1720-0-0x0000000000350000-0x00000000003AA000-memory.dmp

    Filesize

    360KB

  • memory/1720-126-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB