Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 14:53

General

  • Target

    39961cb55fd3ca36bc9ec9da5026e91e_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    39961cb55fd3ca36bc9ec9da5026e91e

  • SHA1

    47e89a995ad66a7c65b6a07899e54e01f2c3027d

  • SHA256

    f84bd1531500638f433739e09bb01af91e885a148a107cb23553ff6e8bb3634d

  • SHA512

    ab442a732cf90e7995e4f077c66b615a38ec91376567dc5d42f3d76d6c53e71ba7b0e2a455543026ada1f4797c5757cb32c93dcad43b123d327bb19cf84ed7c9

  • SSDEEP

    768:be8bNRqsuhlGOBnhgFwumSCbxTGy/BBGg4NKJJKqUThbJ32+ve7i40vN0TlT+Xkz:znqJu3abBGy3G8V0iuoKG

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39961cb55fd3ca36bc9ec9da5026e91e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\39961cb55fd3ca36bc9ec9da5026e91e_JaffaCakes118.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\dsnp.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\dsnp.exe" 39961cb55fd3ca36bc9ec9da5026e91e_JaffaCakes118
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\SysWOW64\Windows 3D.scr

          Filesize

          76KB

          MD5

          8c6ebe86256aea531b5f792b36dda8f6

          SHA1

          266fcc2b4f7c43e92199e301bcca8a62e5bfd4c0

          SHA256

          60c03800db97deb27fda77a515c8ebf2a718e693d50d9a491fa144fbeb6dd75a

          SHA512

          53f49a06adfa0ad5b819865b7613b50332d545695cc2595ac4e214340f74dc6fe2084f09ee7a760896bfc51951ee8a837f4f79881c44c6d2c8d9d92a0796eaf3

        • \Users\Admin\AppData\Roaming\Microsoft\dsnp.exe

          Filesize

          76KB

          MD5

          f30736a926f2da4d985b178541caa846

          SHA1

          d3e2d324781b0949a38a7c662f5f9ccc482c489c

          SHA256

          b8053b14ed529c706c5cf63233cd40c6e2d968578c7e2a544d2e300517625c3c

          SHA512

          b5b60eb98464d3e05c7fe621ac5ca6080040e2e5d36ea84a6d35ad1396223c53909ef74ddaaee22665602ff4fbbc0c1433dfd904bd2b2dc1ac2d6f5d1823b021