Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 03:18

General

  • Target

    3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    3781ec2d5c3704d79bb46d276642e89f

  • SHA1

    e84dead60655f1d64a2b5938073a75c8ffbe39ad

  • SHA256

    00bbd692d9876a1f076cafd287610cf8e6f8b929b0c2c117676b0714c12cab1f

  • SHA512

    1f38573a14f31e1de8c93e3b1403723268c181edc1abf4614e0d5217d3be88778252c09aec820fa7fb2f729e034210fd563e2b230472a73557922b0e629c4bb8

  • SSDEEP

    6144:krT/et0DyEBu9F2idZecnl20lHRxp3gXe0M6E81xS0WcHpsFbBq9:krTW2CF3Z4mxxF0MHoTAFb+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 3.exe_deleteme.bat
        3⤵
          PID:5040
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c 3.exe_deleteme.bat
          3⤵
            PID:1772

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe

        Filesize

        76KB

        MD5

        b749d963db7a6d84b590792ea5fabb96

        SHA1

        e5a93efe2c68ae85d797e0d2b65f8ff3cea528d6

        SHA256

        d18dace0530043bdbd497047f860137f01beb650c89de68487edafe92a3b4946

        SHA512

        bbe03d74e9c7f83c9893de28a3650b0655aa21d67e9854c499e0485e4ae0abcfe7ec92454fcf279f4f30f22aa2a4de9095b462374750e7fa85a89064ddc6b9f3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe_deleteme.bat

        Filesize

        144B

        MD5

        a07c140242d501303a0c7a5ac913c0e1

        SHA1

        c348157ab408927eb906d8e8ed8d38eb3e596349

        SHA256

        b336029985b5f56777b70adfa74b0f05482f59c811f3a0522577113f9a8969ad

        SHA512

        6487e47cfc10579d6f2e2285501de6be2ba87b98fe94dea926a0343f1478a4dd7b4a10c3c6c32c67f3d218a9e3b304994089ba4f6c3a239e2164d1548b08808d

      • C:\Windows\SysWOW64\qqmmck.vxd

        Filesize

        51KB

        MD5

        cbbbdd1367971afcd5165b7e85509ef0

        SHA1

        78c7272e54321020b4c5c572dae373a0fc5c3e37

        SHA256

        41f7b0c0c814b98124a2c8f31dcd6c0e9e136878e4594cb287f6115c0e4a647c

        SHA512

        02e0fbcc1ae12887b3608dd6dc42e0f2157fbb73ba48d267731207a0fa5126c705e9949a07ba49b4e2f722410048daed74081d804949daebf23b27c2335de913

      • memory/1248-48-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/3272-33-0x0000000000670000-0x0000000000671000-memory.dmp

        Filesize

        4KB

      • memory/3272-26-0x0000000000680000-0x0000000000681000-memory.dmp

        Filesize

        4KB

      • memory/3272-20-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-19-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-18-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-17-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-15-0x0000000000630000-0x0000000000631000-memory.dmp

        Filesize

        4KB

      • memory/3272-14-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-13-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-12-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-30-0x00000000006D0000-0x00000000006D1000-memory.dmp

        Filesize

        4KB

      • memory/3272-39-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-38-0x0000000000D10000-0x0000000000D11000-memory.dmp

        Filesize

        4KB

      • memory/3272-29-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/3272-37-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

        Filesize

        4KB

      • memory/3272-36-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

        Filesize

        4KB

      • memory/3272-35-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

        Filesize

        4KB

      • memory/3272-28-0x0000000000660000-0x0000000000661000-memory.dmp

        Filesize

        4KB

      • memory/3272-0-0x0000000001000000-0x000000000107A000-memory.dmp

        Filesize

        488KB

      • memory/3272-32-0x0000000000C80000-0x0000000000C81000-memory.dmp

        Filesize

        4KB

      • memory/3272-21-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-31-0x00000000006C0000-0x00000000006C1000-memory.dmp

        Filesize

        4KB

      • memory/3272-34-0x0000000000D00000-0x0000000000D01000-memory.dmp

        Filesize

        4KB

      • memory/3272-24-0x0000000003070000-0x0000000003071000-memory.dmp

        Filesize

        4KB

      • memory/3272-23-0x0000000003070000-0x0000000003071000-memory.dmp

        Filesize

        4KB

      • memory/3272-27-0x0000000000C70000-0x0000000000C71000-memory.dmp

        Filesize

        4KB

      • memory/3272-25-0x00000000006A0000-0x00000000006A1000-memory.dmp

        Filesize

        4KB

      • memory/3272-11-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-10-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-9-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-8-0x0000000000590000-0x0000000000591000-memory.dmp

        Filesize

        4KB

      • memory/3272-7-0x0000000000610000-0x0000000000611000-memory.dmp

        Filesize

        4KB

      • memory/3272-6-0x0000000000530000-0x0000000000531000-memory.dmp

        Filesize

        4KB

      • memory/3272-5-0x0000000000540000-0x0000000000541000-memory.dmp

        Filesize

        4KB

      • memory/3272-4-0x0000000000620000-0x0000000000621000-memory.dmp

        Filesize

        4KB

      • memory/3272-2-0x0000000000580000-0x0000000000581000-memory.dmp

        Filesize

        4KB

      • memory/3272-22-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-16-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/3272-3-0x0000000000560000-0x0000000000561000-memory.dmp

        Filesize

        4KB

      • memory/3272-58-0x0000000001000000-0x000000000107A000-memory.dmp

        Filesize

        488KB

      • memory/3272-1-0x00000000005B0000-0x0000000000604000-memory.dmp

        Filesize

        336KB

      • memory/3272-59-0x00000000005B0000-0x0000000000604000-memory.dmp

        Filesize

        336KB

      • memory/4020-55-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB