Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 04:14

General

  • Target

    33421e3896caf7336188eeb53a6255fb_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    33421e3896caf7336188eeb53a6255fb

  • SHA1

    ce3287892b93a232854bfafa709f02685ce89e53

  • SHA256

    89770377263d861aa33933a304f9d47f7ae3cb3c091718f96c41833bfdad19da

  • SHA512

    c25d56b9aa7704a11f3eeadbf51a945d8b6be3f30adb99d3a3d99867cd28c44ee2b9e48547f8bd7eb33689f292a1cb973f3e77677fc96f9765290e41c77ecbbe

  • SSDEEP

    768:y8emlttVCRY6o6ob1Zlc2pH0AyB9jxuio8E2BcK4j4d7ELlI4DzxuhIO+fqtQ54F:y8JlzVXT9hTc0aFbXcKk4+Cosh2fqtQ+

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1096
      • C:\Users\Admin\AppData\Local\Temp\33421e3896caf7336188eeb53a6255fb_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\33421e3896caf7336188eeb53a6255fb_JaffaCakes118.exe"
        2⤵
        • Drops file in Drivers directory
        • Sets service image path in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\33421e3896caf7336188eeb53a6255fb_JaffaCakes118.exe
          3⤵
            PID:2696

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\windhcp.ocx

              Filesize

              41KB

              MD5

              9af5ef3016669a584214338a8db69c2c

              SHA1

              0c1cd0314e62e989db53aa2aa5bda006d42689a3

              SHA256

              040c127aac5b6961958e246f5bb6746142197a8c88383c0482fc56622058c077

              SHA512

              9449c1807c15492b5a584ea3ed722062f557da241008f67039d3dc3c51a2a86b0ebb6de07bc8aef1735311435eb3bafa95c855cc519ead06765faad485524351

            • memory/1096-6-0x0000000002600000-0x0000000002601000-memory.dmp

              Filesize

              4KB

            • memory/2684-8-0x0000000000020000-0x0000000000022000-memory.dmp

              Filesize

              8KB

            • memory/2684-7-0x0000000001900000-0x000000000191C000-memory.dmp

              Filesize

              112KB