Analysis

  • max time kernel
    145s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 21:07

General

  • Target

    366242f9116fa66bbad784daaa6d0653_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    366242f9116fa66bbad784daaa6d0653

  • SHA1

    9aebfe36ff5b313fe7a2d73ab7f049a423bb0d71

  • SHA256

    e732636fb25b111f94cf990810706138ae6302a3c66e4e46dbb813f40d6fe803

  • SHA512

    6b1b4c77bddaabf3f85f376cdf3ff12ee496e8e5f735bb947d71a94c1ddf6c4b065f828fcd18916f40053c1a7f70bd9305af77ff87654b808569e1ac7b2d3d4e

  • SSDEEP

    24576:/cBmYktcs++5FGcILtuLBshbDtgQKXdZXE6EhllNGK7Vf77GBPBAIDA0w:/3hVFYLtUshbDtgQKPh0xGmVj7GB5Av

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\366242f9116fa66bbad784daaa6d0653_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\366242f9116fa66bbad784daaa6d0653_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/560-0-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-1-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-2-0x0000000000A24000-0x0000000000AD9000-memory.dmp

    Filesize

    724KB

  • memory/560-7-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-9-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-10-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-8-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-6-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-5-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-4-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-11-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-12-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-14-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-15-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-17-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-18-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-23-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/560-26-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB