Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2024 19:30

General

  • Target

    3a730940d2b08a0bf4e9fa2714cbbff8_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    3a730940d2b08a0bf4e9fa2714cbbff8

  • SHA1

    f4413f8d3c44c1b4c41b2df7ddc3414402537924

  • SHA256

    fa3f755e8c520ce8b29df9dbf21266b5482f06ab4b72008031c5ffb10bd15e40

  • SHA512

    9a8c3238eaca0699e2c97524b17e3caf814cbd782e07bac91ac106f948718993e5ad35bc8e1996b4384ad5825d57719da8d84e4d50406edaa2ce5c3c047eab78

  • SSDEEP

    3072:MRAhhcsxgAJuK7bZD01GoI0ONtNmlngmx5MO0xiIk:MRAhhJxX7bNIFlxt

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a730940d2b08a0bf4e9fa2714cbbff8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a730940d2b08a0bf4e9fa2714cbbff8_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\concp32.exe

    Filesize

    152KB

    MD5

    2a82b987d2fe7ba9cafd4f499def4956

    SHA1

    70681d91d4dd90d0db342060be142c9a7adf664a

    SHA256

    c0c380e0bb2e1e1c81ca0084db59d8d47d6d5a32aa9d39f547972b14e02a71bf

    SHA512

    5979c32de5c750b55a5d4e184452567de82963b4bf3b4a658cef743e9c07cdb90e492795a6074315ee27b238b4531319d977c604d85ce73936969f12f87897fb

  • C:\Windows\spoolsv.exe

    Filesize

    145KB

    MD5

    577eea2a663a340c142f2503d847c980

    SHA1

    8631a362e9f72b1896bcc71908989cdff7c4a969

    SHA256

    dc8a17284b7f3f59a7cba096f75781577a2643f1d22b86a5327fe7899d45066e

    SHA512

    a6e71913d02b6ccbea4935a0d4045bf29bb6929dd37da8f57476eb95a5cf21087c2db9063ba8bedf40fa14cbae55c4cec26c56c420b1f9f5ad148c02cae80cc3

  • memory/2684-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2684-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/3008-15-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB