Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 20:39

General

  • Target

    3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    3aa351387b53449aba8d58f8e7e41e61

  • SHA1

    bbc04810199e233e0ee02c402e4af0771e89ff9e

  • SHA256

    08c612b8bb61157ca05e3082389952286e19174ae0192a9d79b248d50bbcc146

  • SHA512

    d42de8651536bda7f0e034a7435d3a9eb254ffa7341b7fc8e7eda886e6962dcc9b6909e9748f9d8ecd3e68b01c8e4a4fdbcca7f7d59c640d51e10e27ade2e119

  • SSDEEP

    6144:WkPlSwSmzEnqjDWrzF/zUc7AeY6EJsObtbHxcLXnJELlZfzuNdKr+Q0:UzUgcFswbRoXnS6M

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\Urimaa.exe
      C:\Windows\Urimaa.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:1568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    0faa9015f722e2ba6b677340aacbab03

    SHA1

    8b254da402013840cf799e96b78bc80fe76c16b2

    SHA256

    eeb9e914f59367c1e41db3cb5e1f3d38c7e06e679859ae1b36c66dbbc51e5d0c

    SHA512

    250b0a1a19b1e0066ff569afecb949a9ee27f15c99f67c70bd7606af164d5f3be511c2c9189226f4977ca66853410c0b14cc6341b4682f5b3ee38e8c143cab57

  • C:\Windows\Urimaa.exe

    Filesize

    496KB

    MD5

    3aa351387b53449aba8d58f8e7e41e61

    SHA1

    bbc04810199e233e0ee02c402e4af0771e89ff9e

    SHA256

    08c612b8bb61157ca05e3082389952286e19174ae0192a9d79b248d50bbcc146

    SHA512

    d42de8651536bda7f0e034a7435d3a9eb254ffa7341b7fc8e7eda886e6962dcc9b6909e9748f9d8ecd3e68b01c8e4a4fdbcca7f7d59c640d51e10e27ade2e119

  • memory/1568-14-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1568-48259-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1568-21-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2984-5-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2984-12-0x0000000000380000-0x00000000003FE000-memory.dmp

    Filesize

    504KB

  • memory/2984-0-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2984-2-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2984-41499-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2984-48255-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2984-48257-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2984-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB