Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 22:52

General

  • Target

    3f31f5aeaeab0707154f1a40443484bb_JaffaCakes118.exe

  • Size

    79KB

  • MD5

    3f31f5aeaeab0707154f1a40443484bb

  • SHA1

    9ef0b81f8970b28115c4e5cfdf6b83b018c238f9

  • SHA256

    6939363945fbc31e4d395a411003a26cabd215eb6e6624c41eb81f8f8bfc5220

  • SHA512

    ba87a1425385155c1317153fbe2f9ddc549db98d78e8b7f38542520663dae3949aa33f88f7afc4271e15caf6c85c09b93b8a7a84b068d4ca53550d29665f485a

  • SSDEEP

    1536:ur3G8zWWlaqymr8Vq2EQDHduPv4iQzYZMQdgFHmv4CGnXcxNYYt5kltkkpvAsvQ4:CGoWiabmr802bD9niQzYZxCmvAnM/7sJ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f31f5aeaeab0707154f1a40443484bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f31f5aeaeab0707154f1a40443484bb_JaffaCakes118.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jtb..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:1292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Jtb..bat

          Filesize

          238B

          MD5

          e741645d8b0f6f3947805d78eae17443

          SHA1

          92a3e492d9b1a3edfb1697f7e0a32add554f5b87

          SHA256

          ed15ce60156271ad462b6951ef0aff19e0f9dc2ea9d2aec395576ce6927307bc

          SHA512

          65fd62904dc8c0e4b6bfc8026fdf7efa6d73b45a75eee1c8fa8018e27cb82e0601dfbf83dc675efdf859235c7b38a7a5db76131ea7410769ac2d4a6403d5c2f7

        • memory/1732-0-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/1732-1-0x00000000001E0000-0x00000000001E1000-memory.dmp

          Filesize

          4KB

        • memory/1732-2-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/1732-3-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/1732-6-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB