Analysis

  • max time kernel
    142s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 23:50

General

  • Target

    36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe

  • Size

    778KB

  • MD5

    36e65384ecca1d1f0e4f88e0be3a400b

  • SHA1

    b4ab8bc4a59edc872e03312c35e70ea793e59b91

  • SHA256

    a0f0cbc0bd2377ee8a06f8774f537145f4e4fbe8d5bff8b136b064d2bd6b7b18

  • SHA512

    bb2aac9f949f9a004cac7408136422bcd819886fd60207dede9facf65c04f50581f07ebf55dcde83224a39750a89431c4539e6371278ccbc1e584d27b17b35b5

  • SSDEEP

    12288:1COSnclIgZQxVJ2p2AltRtphv7kO6KUqx2E9pAJDU44GLChfCZT:o8IJ28AltLpl7KypyU4pChaZT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2316
  • C:\Windows\heimao.exe
    C:\Windows\heimao.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2620

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\1.exe

            Filesize

            739KB

            MD5

            6c6799bd60d05224c2509a139350db72

            SHA1

            e1dac8ef09200e755985444953726def85978512

            SHA256

            b6330cfc0f65ea960a133f1a3eff8bb90bc38ce386f8473932804331743482f3

            SHA512

            ad380167952c2e60b8ea96ad1516561bb614d09dc33e086522b1078f10cf265ce874a90ecd7354dc743e12554e8628944526dff56236b62085e77381043e5e79

          • memory/2316-14-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/2316-18-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2780-1-0x0000000000400000-0x00000000004C5000-memory.dmp

            Filesize

            788KB

          • memory/2780-9-0x0000000000400000-0x00000000004C5000-memory.dmp

            Filesize

            788KB

          • memory/2796-16-0x00000000003D0000-0x00000000003D1000-memory.dmp

            Filesize

            4KB

          • memory/2796-19-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2796-21-0x00000000003D0000-0x00000000003D1000-memory.dmp

            Filesize

            4KB

          • memory/2796-24-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB