Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 23:05

General

  • Target

    3b126937a30a14d414910eec72688142_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    3b126937a30a14d414910eec72688142

  • SHA1

    631793a8f54b011a69feade1da17d4d01c9385fe

  • SHA256

    10e74a5346fe3d20de68a0041fdfeb534a34dd7ce53992cb78c3e1bc418bced6

  • SHA512

    d6fa7f45837049c20f39ccede0676b73047a7c1ed8a2d59b526fe2d2c034ebb0d4bab694e608eb362e63cff2f75be8502c9908b836de3abca4a7e27af6d6f166

  • SSDEEP

    768:lEks4rinb4Pi/6kYtJ8brlqRiDPWTR/k/6cK6zoSeMbR4VWVu6lqT12TYnokAV4R:lU4rR6SkYvTK6g3enVIuaqizk0s

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b126937a30a14d414910eec72688142_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b126937a30a14d414910eec72688142_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\galle.exe
      C:\Windows\system32\galle.exe
      2⤵
      • Executes dropped EXE
      PID:2680

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\galle.exe

          Filesize

          20KB

          MD5

          8abe3fcfe0791df040abbe85c03a6c97

          SHA1

          01d4ac44a4ba9edd9998f8be0ec1354c3df511c4

          SHA256

          986b81412273a2cb454db21088ebc13e7db11af08f1cb9b6eb00ec379a604e91

          SHA512

          c6e48e50a7045bb5a56d67722d2087a244d47bed5dec4dfb19140cf9cd43d1990344aae24354417452f37ba35611233ad5e28f41d174b7e0a7268ae891ff7c57

        • memory/1304-0-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/1304-30-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2680-29-0x0000000010000000-0x0000000010011000-memory.dmp

          Filesize

          68KB

        • memory/2680-28-0x0000000000401000-0x0000000000408000-memory.dmp

          Filesize

          28KB

        • memory/2680-27-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2680-23-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2680-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2680-17-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2680-14-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2680-12-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2680-10-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB