Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 05:29

General

  • Target

    37df077458e43eb706b80d27be285d52_JaffaCakes118.exe

  • Size

    345KB

  • MD5

    37df077458e43eb706b80d27be285d52

  • SHA1

    0dd6432d8276086a5e3f18f2eac45b2a1cbde2e7

  • SHA256

    14b70336cd626a6ad2f56d5f3058016db672e2c85d589c5542176cf55f6e94dc

  • SHA512

    d5dcedf30e8a642502a4d67e8af89b392bd38ad157b3df986976aed3855c49333660e33c60e4fffdb200b3625cec5f93d37bc01de8b8338c18d43b154a68ee8d

  • SSDEEP

    6144:vzMs/zw1vpM3BlfMkYmgtG94COSNsxRcM48SmYJ0KDpAysbRWOKJ/nxTXTcYT:7//zw1xM3nDgtG+CJN2RcMpYJlu7bRWb

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37df077458e43eb706b80d27be285d52_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\37df077458e43eb706b80d27be285d52_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ë¢×ê»ú~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ë¢×ê»ú~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat
        3⤵
          PID:3432
    • C:\Windows\350l.exe
      C:\Windows\350l.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:4336

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ë¢×ê»ú~1.EXE

              Filesize

              660KB

              MD5

              33f1a1aed5492a47497456150c4e94d3

              SHA1

              90f447d4ad760bdde647f802831e8a11e7cb0957

              SHA256

              448fd421a5f1899c0fc7e73f35e333a2ee8f0dbb146f64798383537d505b7b54

              SHA512

              f23b73d08fcd376de5581c5ae98413ae74bb3f4f6fa29ed000ca9a94e28bbe9284bd4565ce0d1acde9e695df395c24367b0196c6660fdd21662f1ffd9d9f24d0

            • C:\Windows\Delete.bat

              Filesize

              160B

              MD5

              07260fbb5d73969b25d9dbf9f313c56e

              SHA1

              68e91071bf094676136e8f6dc4eb794d52cc3782

              SHA256

              553f99e33dc443a93755b2d9ab50986984632214e1eb4fc1516158dc45551bab

              SHA512

              32c1abab6dba14c784a89e4ec19b724c71ab5e1816a585e4083b1772177c54361c8080ea307b0973f11ba574c997d936f9e1869f1845327dd860c55650c20045

            • memory/1232-15-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

              Filesize

              4KB

            • memory/1232-20-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

              Filesize

              4KB

            • memory/2468-8-0x0000000000400000-0x00000000004A9000-memory.dmp

              Filesize

              676KB

            • memory/2468-9-0x0000000002260000-0x0000000002261000-memory.dmp

              Filesize

              4KB

            • memory/3232-0-0x0000000001000000-0x00000000010A8000-memory.dmp

              Filesize

              672KB

            • memory/3232-2-0x000000000109C000-0x000000000109D000-memory.dmp

              Filesize

              4KB

            • memory/3232-1-0x0000000001000000-0x00000000010A8000-memory.dmp

              Filesize

              672KB

            • memory/3232-18-0x0000000001000000-0x00000000010A8000-memory.dmp

              Filesize

              672KB