Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 02:48

General

  • Target

    3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    3bb711149502c3a0f3193224cdb2bfa6

  • SHA1

    63f156ffe9fcbeb22484421cd2ae3b77a70d44cf

  • SHA256

    40d28e7b5cc9d6e07d4ed5b51d8f00ffaa4a1fb9a0066be4d7809fcb265e4986

  • SHA512

    9c1fd4f41599338152403bbf536172c545bcd50ede6bba99d7a69c05d04c693d4f02b8514c044cf17b0545a9bab7218f68e3955958f0316fbe206df12ca868d6

  • SSDEEP

    6144:Wq96LzpTw0jTHwOZDoxX55mC7e+ySRIJrcyTft:yX1/THx2X5YzpSRIJrLjt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1112
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1212
          • C:\Users\Admin\AppData\Local\Temp\3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\3bb711149502c3a0f3193224cdb2bfa6_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Users\Admin\AppData\Roaming\Geaj\ihviyq.exe
              "C:\Users\Admin\AppData\Roaming\Geaj\ihviyq.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2396
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f5d87d8.bat"
              3⤵
              • Deletes itself
              PID:1984
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1520

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp7f5d87d8.bat

            Filesize

            271B

            MD5

            8702df8f77864381e95a77712c39c317

            SHA1

            2cd0b18ac20d8dfc908f4e78d8638cda6fb1a02f

            SHA256

            55494e93bc567985269d8bd6ed09201cfb467e51744ff0772acbe2d06d447545

            SHA512

            628ef05970ee072901a192b307143e2718662ef7f7150886db2913e75f049d7bb7440c492020e47203b3a7add9487234a4691ae0da7b87dde358fc6dcbd34d80

          • C:\Users\Admin\AppData\Roaming\Geaj\ihviyq.exe

            Filesize

            296KB

            MD5

            282e57afcb21d64ce43586968fda0df5

            SHA1

            34ff527e3ca0e432a8753a240ced11ea2ea75700

            SHA256

            41e86b9e45551306f2087fdc5f9da03e4867ecf170518f0407127f7264e2227b

            SHA512

            545ef766faa2accc2c00806579ea1e2a1b06891e1b5206e8f89dc04c52c8b87ff88b78e0065d32b3642711a7927aa697143bc7225c0d7214c124d2f3cc384235

          • memory/1112-17-0x0000000000520000-0x0000000000563000-memory.dmp

            Filesize

            268KB

          • memory/1112-13-0x0000000000520000-0x0000000000563000-memory.dmp

            Filesize

            268KB

          • memory/1112-14-0x0000000000520000-0x0000000000563000-memory.dmp

            Filesize

            268KB

          • memory/1112-15-0x0000000000520000-0x0000000000563000-memory.dmp

            Filesize

            268KB

          • memory/1112-16-0x0000000000520000-0x0000000000563000-memory.dmp

            Filesize

            268KB

          • memory/1176-26-0x0000000001FB0000-0x0000000001FF3000-memory.dmp

            Filesize

            268KB

          • memory/1176-24-0x0000000001FB0000-0x0000000001FF3000-memory.dmp

            Filesize

            268KB

          • memory/1176-21-0x0000000001FB0000-0x0000000001FF3000-memory.dmp

            Filesize

            268KB

          • memory/1176-22-0x0000000001FB0000-0x0000000001FF3000-memory.dmp

            Filesize

            268KB

          • memory/1212-29-0x0000000002D40000-0x0000000002D83000-memory.dmp

            Filesize

            268KB

          • memory/1212-30-0x0000000002D40000-0x0000000002D83000-memory.dmp

            Filesize

            268KB

          • memory/1212-31-0x0000000002D40000-0x0000000002D83000-memory.dmp

            Filesize

            268KB

          • memory/1212-32-0x0000000002D40000-0x0000000002D83000-memory.dmp

            Filesize

            268KB

          • memory/1520-36-0x0000000001F50000-0x0000000001F93000-memory.dmp

            Filesize

            268KB

          • memory/1520-35-0x0000000001F50000-0x0000000001F93000-memory.dmp

            Filesize

            268KB

          • memory/1520-37-0x0000000001F50000-0x0000000001F93000-memory.dmp

            Filesize

            268KB

          • memory/1520-34-0x0000000001F50000-0x0000000001F93000-memory.dmp

            Filesize

            268KB

          • memory/1992-156-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-40-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-67-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-65-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-63-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-61-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-59-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-57-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-55-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-53-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-51-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-49-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-47-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-0-0x0000000000320000-0x0000000000363000-memory.dmp

            Filesize

            268KB

          • memory/1992-2-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1992-3-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1992-43-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-42-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-41-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-69-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-39-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-71-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-73-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-154-0x0000000000370000-0x00000000003BD000-memory.dmp

            Filesize

            308KB

          • memory/1992-155-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1992-1-0x0000000000370000-0x00000000003BD000-memory.dmp

            Filesize

            308KB

          • memory/1992-75-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-129-0x0000000001D30000-0x0000000001D73000-memory.dmp

            Filesize

            268KB

          • memory/1992-131-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-130-0x0000000076F80000-0x0000000076F81000-memory.dmp

            Filesize

            4KB

          • memory/1992-77-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/1992-4-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1992-7-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/2396-44-0x0000000000280000-0x00000000002C3000-memory.dmp

            Filesize

            268KB

          • memory/2396-45-0x0000000000380000-0x00000000003CD000-memory.dmp

            Filesize

            308KB

          • memory/2396-46-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/2396-275-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB