Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 10:05

General

  • Target

    38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe

  • Size

    178KB

  • MD5

    38ae37ad96f07d93b71d5e14f7d54f53

  • SHA1

    b68888dbab6dbc9ecc6ca308c70bfd77bf3e31d3

  • SHA256

    44eb3271aa56f12aff0461b7e7e797dd352e495d44afb4a3e1cd095ae5c2a95c

  • SHA512

    f49939a4ee613893a1837ccad779449a7dae377e889d9c08ade78e3bf97bb47448cc570e5334f05499dee32014b51f55ec63018ef80f7f8d55ddfb92985fce2a

  • SSDEEP

    3072:u0Gox2PD7tC6PNDk/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPoWqGU/n6CbzGcBIMHIGl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\Fcadea.exe
      C:\Windows\Fcadea.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Fcadea.exe

    Filesize

    178KB

    MD5

    38ae37ad96f07d93b71d5e14f7d54f53

    SHA1

    b68888dbab6dbc9ecc6ca308c70bfd77bf3e31d3

    SHA256

    44eb3271aa56f12aff0461b7e7e797dd352e495d44afb4a3e1cd095ae5c2a95c

    SHA512

    f49939a4ee613893a1837ccad779449a7dae377e889d9c08ade78e3bf97bb47448cc570e5334f05499dee32014b51f55ec63018ef80f7f8d55ddfb92985fce2a

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    c69e3161e9cb5de3532588edb00efa26

    SHA1

    c12fe6d1dfdf51f34a771df9a537442303ca9da9

    SHA256

    ca1fc5936171e2cf8a3f74c7aacf9bcbc7869a1423e8c2f595860a17c0c8ea60

    SHA512

    a7133d4efa9bac350285ca86c443c6610416f6101d7629af2d7b439e8cf89c8f8121c2382ca24a6781e9f77f07320c130e806941b6f7ebe784c5460f9fcce7db

  • memory/2824-9-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-8-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-45486-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-45488-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-45489-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-45490-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-45492-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2824-45496-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2840-0-0x0000000000260000-0x0000000000275000-memory.dmp

    Filesize

    84KB

  • memory/2840-10-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2840-1-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2840-45485-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB