Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 16:07

General

  • Target

    3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe

  • Size

    74KB

  • MD5

    3570e429401a91e49c9f78a63b0dfd30

  • SHA1

    ce704faac303206fcf847fc0eac825871f3f3eac

  • SHA256

    da7888d98bd5231810b3c30b957bb442a46a91649df5d6b77b5d09958d83d4f5

  • SHA512

    e35e3558c7434533e6d37872de997c190219b4b89520cc542b64f48474a8de99b7d18774fc3e408852283952d339938bb7edec43be40295a2216d56851d3675e

  • SSDEEP

    1536:T6CHQGWSGy/p7MocYIlqNxzWX0ITXi/m6eR5D2KdXhsL/H:hHQGWJCMdTlqNxo0mX4m6KDzDszH

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Enumerates system info in registry
    PID:1888
  • C:\Windows\SysWOW64\mspprztn.exe
    C:\Windows\SysWOW64\mspprztn.exe /service
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Hide Artifacts: Hidden Users
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\mspprztn.exe

    Filesize

    74KB

    MD5

    3570e429401a91e49c9f78a63b0dfd30

    SHA1

    ce704faac303206fcf847fc0eac825871f3f3eac

    SHA256

    da7888d98bd5231810b3c30b957bb442a46a91649df5d6b77b5d09958d83d4f5

    SHA512

    e35e3558c7434533e6d37872de997c190219b4b89520cc542b64f48474a8de99b7d18774fc3e408852283952d339938bb7edec43be40295a2216d56851d3675e

  • memory/1888-1-0x0000000000200000-0x000000000020D000-memory.dmp

    Filesize

    52KB

  • memory/1888-0-0x00000000001F0000-0x00000000001FE000-memory.dmp

    Filesize

    56KB

  • memory/1888-2-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1888-8-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1888-9-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2412-6-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2412-5-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2412-7-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2412-10-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB