Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 20:51

General

  • Target

    365449e609f7559239b7f46647c448d5_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    365449e609f7559239b7f46647c448d5

  • SHA1

    8ce96461681284b48fce8b68d4a8a6edbd6c95e8

  • SHA256

    2c703161eeb6061dd827c47db2dea938042ff0965777a40a1c541fa111b726a7

  • SHA512

    edb78f186ec8380561268d659bcbf59266a144d0983da4cba80bb00cda5e9ea10a1b60f63c8cda1582469e3394f26cea551a6847150d35befe097be08416d48c

  • SSDEEP

    384:DaC+kfbi9C74+r1D+zOiQuAuWxjJMnHQm9jexTvj0iEhTGN:mfa6C8+r5+ihKnHQmoRbPEdM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\365449e609f7559239b7f46647c448d5_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\365449e609f7559239b7f46647c448d5_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\isndntio.dll

      Filesize

      36KB

      MD5

      2dd4610e8ff5231fc884ab01c6a918ee

      SHA1

      1b4bcab970bf97ce5422ccbd42d4fd1df3e0b4cf

      SHA256

      f20990d6fbea65ecc13c1c2fd581f61a0760f776879d2fee4a55d95195c61a91

      SHA512

      c43404544f6cc33affcf09142bfc6da2bcd7bf2e0363c7a25a8da956a149acff3d3abc08fd1e460228a607717537428635e381b043da721ea211802939d6a730

    • memory/1228-2-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

      Filesize

      4KB

    • memory/2324-15-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2324-11-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2324-20-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/2324-19-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB