Analysis

  • max time kernel
    22s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 14:29

General

  • Target

    351d8735dbab09c8237a9bc46e5a2c45_JaffaCakes118.exe

  • Size

    466KB

  • MD5

    351d8735dbab09c8237a9bc46e5a2c45

  • SHA1

    652b6627cf49cd71540f5fec4c63fcb99570e65d

  • SHA256

    b7e80fd57af4490345d48492ef94f2e16c33278a190d5b8a24b4ca70b2b59b1a

  • SHA512

    bf2d17368ae10f76a575e68456604a3ff6f6fd4d2be4d2a1917f81e9bdd1144845d4e44917c277f424be6f6c2a511c366eba42d4420a96af3f392cc94f18957d

  • SSDEEP

    6144:sMIAJz0r5mJ5x1KTfVm8/1mFwq1iftIDmzOJvZzVVt4E3tH4mGtTyN1pH+rTz:d29dfVXfAmzIZRVtz14n7T

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\351d8735dbab09c8237a9bc46e5a2c45_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\351d8735dbab09c8237a9bc46e5a2c45_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\351d8735dbab09c8237a9bc46e5a2c45_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\351d8735dbab09c8237a9bc46e5a2c45_JaffaCakes118.exe
      2⤵
      • Enumerates VirtualBox registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:1976

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1596-41-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/1596-10-0x0000000001F60000-0x0000000002018000-memory.dmp

          Filesize

          736KB

        • memory/1596-0-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/1976-24-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-18-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-36-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-30-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-27-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-42-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-21-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-37-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1976-15-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-8-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-33-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-5-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-3-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-1-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-13-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB

        • memory/1976-43-0x0000000000400000-0x000000000047D000-memory.dmp

          Filesize

          500KB