Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 00:48

General

  • Target

    32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe

  • Size

    107KB

  • MD5

    32a9a93e9106fe90b97a2b90e90f7ed3

  • SHA1

    bf6130f31985392bb2724991bd4d86d0f999a2ab

  • SHA256

    6cb4f7acbb76f0403a82b6325ee4996397b6f7f69c8be3544f1c535b58b93227

  • SHA512

    5fc85b898618ef4601a80f7028259ee08df29021d4b2add85d07792f0a6a6884e19cd6c70e3cc8b180c4b25ddcd606acd7ad614ed6cbb330b5f42de0e31b07db

  • SSDEEP

    1536:lnR5wgjPoY50I1HUMF971bSom3rVPFDTHXVIS4pJTQSVKry41eYsI/:loUPnP1H594rRhmPQVryced2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\32a9a93e9106fe90b97a2b90e90f7ed3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\kodsf.exe
      "C:\Users\Admin\AppData\Local\Temp\kodsf.exe"
      2⤵
      • Executes dropped EXE
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\kodsf.exe

    Filesize

    73KB

    MD5

    ffba5287555f5eb2668eba0f4f797bff

    SHA1

    64df61d9b3edc6bb4b4c86ce82f14f0ed8dd8b11

    SHA256

    1c22347713b5cd166a84df98457e560bcb6309c19863639d7c464b538d115061

    SHA512

    a11f6f2da7ed10882f231371211e90b1d184228174aa81afae35fcc1ef87858880309356eba49b0b0a10e3b4af37d88038ea340837a7e3794cea147ce3666744

  • \Windows\SysWOW64\aplib.dll

    Filesize

    12KB

    MD5

    35d174edd3c0bcfa9a32dce19e1abeb9

    SHA1

    c22638e64f8a5f34809811a2c286ae2f115028f8

    SHA256

    34194aa58d0eb70b513ea6a876a4f35ba6cc2f19c4fb6d408dd05580dcc74b04

    SHA512

    f807df3655e6dd0cea2412ae82aa7b3babe3862fa9eee5d38673ee30b26a528b9618e1a25d3a58ef1ff14be36a666fabd32968b5f4dc481539d2372b526c1ead

  • memory/2700-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2700-1-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2700-2-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2700-21-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2888-22-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB