Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 20:28

General

  • Target

    364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    364207f4224d4b95bdc4f983b82569e2

  • SHA1

    f264b02c27f6566e66d9ff4935d64f189f2da5b4

  • SHA256

    bbcee4f0b127da013eb6c02a20cccb28fc41a848b4765b9b3ce136a7154e8651

  • SHA512

    6636648463f8d1db52bfe1d63f3c81629f7af88984f3f1adb8041a514be33b472f22b41460d78e9522812c534bbaae95aee8e901cea5fd1b94520b2b81d251b4

  • SSDEEP

    384:Kx4hKXHCuaP9yuxa+qZ4zsVCqTcrK7rPZ:ccAssxcrK7V

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\5BC7.tmp.bat
      2⤵
      • Deletes itself
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5BC7.tmp.bat

    Filesize

    207B

    MD5

    5d8e1a8f79e0658211a69aa7095c702f

    SHA1

    394d8c41e4c1f2d2cc1307530ba1dd0bea875156

    SHA256

    07d9824270a3c51632dc6a4cea9e0f3a3b2a5df2dd36c8dd116f7488ea4ffab7

    SHA512

    42f329cf6a2e59fec1e1b6c8632e518bfedee0c3a603fa1002544bcf715b6dcc82ce62d43a2af421b16ee867c8eb765f499ba3da13d8f7f2658375eea9958700

  • C:\Windows\SysWOW64\lweurqhx.nls

    Filesize

    428B

    MD5

    99a24facb7252a0fbdaee9c946244817

    SHA1

    e44eb6e99677926c372c9fd99326258f58b8da5a

    SHA256

    3e3309d3e67669ef8eefb00e032a4e0784ecf9b91482183bc5b494214f2f0156

    SHA512

    5dbb7e06df8ba7776b703da76c7087a996a7a092c34dfbb8fd7719f51bb29250875d27328331d0469c904f2c6305818cf4a695cbe51435cb3a88aa05139ba1c9

  • C:\Windows\SysWOW64\lweurqhx.tmp

    Filesize

    1021KB

    MD5

    f13e84240f605976ad5a7c47bd02ee54

    SHA1

    05c0f864598b38d7e4f18ef40ac7fe97448eb6f8

    SHA256

    29513e4530f5eca93414428d3fce2d8b5438ff8fb2942533c6d3f99dc70f0668

    SHA512

    ef4ab5b65d4a6f39525cc31a07a43d624c839b1cdbbd014912c25d9296f296f282b3d5f27e12d09de554ce8204379215cfd8181d4daa5ec9035d3cc9e5be7059

  • memory/2984-16-0x0000000020000000-0x0000000020008000-memory.dmp

    Filesize

    32KB

  • memory/2984-25-0x0000000020000000-0x0000000020008000-memory.dmp

    Filesize

    32KB