Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 11:10

General

  • Target

    38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    38df3b8dc7d816da6efb42a7939075c3

  • SHA1

    b9dded5e0173512368b4fc5f8fd3d1d3c1052b42

  • SHA256

    029a514f04dcc0a8101f620057c4c0bb38a894ac95af5ecb902ff5f80fdf2615

  • SHA512

    2d9a388601b528d4d37d01e9c885cafc9d8c44d761438ad1f9678b46977122aba112450f61108d664ae600b5a0a2dd141863a45f4428332f69bb5f88d04522f0

  • SSDEEP

    384:m0ZnH+9//AZTSzbX8MFNYNVctnmYLDye:mced/k+b8MGctnr

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Windows\SysWOW64\qensngk.exe
      C:\Windows\system32\qensngk.exe t!
      2⤵
      • Executes dropped EXE
      PID:3272
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe.bat
      2⤵
        PID:3784

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\38df3b8dc7d816da6efb42a7939075c3_JaffaCakes118.exe.bat

            Filesize

            210B

            MD5

            c7441634e0a1adda6bcf385e6d8dc6a1

            SHA1

            d6d6237971c41a2ade2bfd4fd8a251a9dfb0e459

            SHA256

            f36cef5eb55c9ea532bbdc9600c853dd7727202ceb3d3e6d273dc7ef8b922f07

            SHA512

            33a4f046087b70b1941cca445c48de7a55986a77acbf7a22ec67a9c97cd61d429326117a83d172dc0c2c272b3dd9faa0d29f8f5734363a39911b0297c61e4d86

          • C:\Windows\SysWOW64\qensngk.exe

            Filesize

            13KB

            MD5

            38df3b8dc7d816da6efb42a7939075c3

            SHA1

            b9dded5e0173512368b4fc5f8fd3d1d3c1052b42

            SHA256

            029a514f04dcc0a8101f620057c4c0bb38a894ac95af5ecb902ff5f80fdf2615

            SHA512

            2d9a388601b528d4d37d01e9c885cafc9d8c44d761438ad1f9678b46977122aba112450f61108d664ae600b5a0a2dd141863a45f4428332f69bb5f88d04522f0

          • memory/3272-10-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4456-0-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4456-8-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB