Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 21:37

General

  • Target

    3acd3beebaad8b7d1648347f03f6f2ef_JaffaCakes118.exe

  • Size

    534KB

  • MD5

    3acd3beebaad8b7d1648347f03f6f2ef

  • SHA1

    163befe5a4f18478dc2baf76d04546fc78a08621

  • SHA256

    06b935f8710775424e7c9a82e202012ba15df02f35809e3c07eec30ba8f0906a

  • SHA512

    0d15299e371c1d719930a311cb5660f6f7cfc26c904c41b5df65ff9f365afbbdf5c8e09e9edb2dd1bb5f51f6b5e9992ba7fbb50e132674c91dacb5e78b53ec75

  • SSDEEP

    12288:UsAL/W5L/SZdSCvTF+bDTqXTa7v5ougtHEg/7Q4hvayCRw/R:UsW/WNSZ8CLGETEjgXs4hIe

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3acd3beebaad8b7d1648347f03f6f2ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3acd3beebaad8b7d1648347f03f6f2ef_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:2268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 744
      2⤵
      • Program crash
      PID:2504
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2268 -ip 2268
    1⤵
      PID:3076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\concp32.exe

      Filesize

      543KB

      MD5

      98277f86be24178ee8b90fa821ee7a75

      SHA1

      90a08c9ffeeac63e4a9e0c2330d7f369ec547a1f

      SHA256

      24c05af1b7e6abc7ea81e0ed0677a0937ad3aea9112ee1cf0b83d13f9d2381cc

      SHA512

      8e9c0994cb40ea66c00c31dd31e17565406a10d7d9ca84a23b8cabb79e15e08c21b478c99f3995013282f74d80c6b966df3649e292e79b7e5c541324f43e73a6

    • memory/2268-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2268-7-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB