Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 11:14

General

  • Target

    3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe

  • Size

    355KB

  • MD5

    3d2526007eb44f274a5dabc9911a9262

  • SHA1

    86ca9856e309964d54c84a944791ccc149e1062d

  • SHA256

    45956c9ec5c57cee435f0b8db09af518ddc72ed060ef3484619f1cb2ca1360c0

  • SHA512

    5ef17e63ba12ead2375d7cd38ef19dfd497be4d51939f7133c28cf76313eb9a48d4824f920d1415516f706aa40e3681edb476a38f342dfd71d4ec469b3c34935

  • SSDEEP

    6144:EeRXX2S0RbG1f6/LKtkK4A835k/lM+tpcNlBBdUk4OXT:EeRXkLKtkK7IKe8qTvdULOD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1188
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1252
          • C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2328
            • C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\3d2526007eb44f274a5dabc9911a9262_JaffaCakes118.exe"
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2192
              • C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe
                "C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:684
                • C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe
                  "C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2208
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6d97e890.bat"
                4⤵
                • Deletes itself
                • Modifies Internet Explorer settings
                PID:2712
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1404
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "5082713491313397904-803951113197499489092586481744558283-1178308413-34452173"
            1⤵
              PID:2676

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp6d97e890.bat

              Filesize

              271B

              MD5

              8b98948e7d3b04d3e4416c7328605b89

              SHA1

              dbd3ade0210247af3e78e8ff32c7a515bfdf90a5

              SHA256

              851767ad8ea716a29fd4e74f5fba058c0167575d8c459f1086f91ad7c6f7f3a6

              SHA512

              07b44062c7ffd3450687d8afd74f5e6e6364e8cc6c658fbbeb3925574fe1accbb8a33859d5735ada663d73da5cf549e1d4a5bbc12adc503aee30c7f7a87ba92b

            • C:\Users\Admin\AppData\Roaming\Itwuy\otek.exe

              Filesize

              355KB

              MD5

              2de9d678f81ce50174108c264c2f4198

              SHA1

              8a70769a4eb31552756f0910b10b9cc36fc7d44f

              SHA256

              3cc84d343cd6d07757ba60f28358881321e30143fc1e87be805ae06e63855ac4

              SHA512

              e78c830f1a6aed54b5770bf1835e7786ec0b7e684be562a4e197d9ec09659168e7815fe94770e7d328744b27e1a172551e85eb03e99e41a02492bb6a433d47f0

            • memory/684-31-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/684-47-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1120-51-0x0000000002210000-0x0000000002254000-memory.dmp

              Filesize

              272KB

            • memory/1120-55-0x0000000002210000-0x0000000002254000-memory.dmp

              Filesize

              272KB

            • memory/1120-57-0x0000000002210000-0x0000000002254000-memory.dmp

              Filesize

              272KB

            • memory/1120-53-0x0000000002210000-0x0000000002254000-memory.dmp

              Filesize

              272KB

            • memory/1188-61-0x0000000001EA0000-0x0000000001EE4000-memory.dmp

              Filesize

              272KB

            • memory/1188-60-0x0000000001EA0000-0x0000000001EE4000-memory.dmp

              Filesize

              272KB

            • memory/1188-62-0x0000000001EA0000-0x0000000001EE4000-memory.dmp

              Filesize

              272KB

            • memory/1188-63-0x0000000001EA0000-0x0000000001EE4000-memory.dmp

              Filesize

              272KB

            • memory/1252-66-0x0000000002860000-0x00000000028A4000-memory.dmp

              Filesize

              272KB

            • memory/1252-68-0x0000000002860000-0x00000000028A4000-memory.dmp

              Filesize

              272KB

            • memory/1252-65-0x0000000002860000-0x00000000028A4000-memory.dmp

              Filesize

              272KB

            • memory/1252-67-0x0000000002860000-0x00000000028A4000-memory.dmp

              Filesize

              272KB

            • memory/1404-74-0x0000000001CB0000-0x0000000001CF4000-memory.dmp

              Filesize

              272KB

            • memory/1404-71-0x0000000001CB0000-0x0000000001CF4000-memory.dmp

              Filesize

              272KB

            • memory/1404-73-0x0000000001CB0000-0x0000000001CF4000-memory.dmp

              Filesize

              272KB

            • memory/1404-72-0x0000000001CB0000-0x0000000001CF4000-memory.dmp

              Filesize

              272KB

            • memory/2192-1-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-29-0x0000000000560000-0x00000000005BE000-memory.dmp

              Filesize

              376KB

            • memory/2192-82-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-92-0x0000000000560000-0x00000000005A4000-memory.dmp

              Filesize

              272KB

            • memory/2192-15-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-16-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-80-0x0000000000560000-0x00000000005A4000-memory.dmp

              Filesize

              272KB

            • memory/2192-79-0x0000000000560000-0x00000000005A4000-memory.dmp

              Filesize

              272KB

            • memory/2192-76-0x0000000000560000-0x00000000005A4000-memory.dmp

              Filesize

              272KB

            • memory/2192-11-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-3-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-30-0x0000000000560000-0x00000000005BE000-memory.dmp

              Filesize

              376KB

            • memory/2192-77-0x0000000000560000-0x00000000005A4000-memory.dmp

              Filesize

              272KB

            • memory/2192-78-0x0000000000560000-0x00000000005A4000-memory.dmp

              Filesize

              272KB

            • memory/2192-17-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-18-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2192-21-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-6-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2192-7-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2208-69-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2208-202-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2328-14-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/2328-0-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/2712-93-0x00000000000D0000-0x0000000000114000-memory.dmp

              Filesize

              272KB

            • memory/2712-111-0x0000000077820000-0x0000000077821000-memory.dmp

              Filesize

              4KB

            • memory/2712-200-0x00000000000D0000-0x0000000000114000-memory.dmp

              Filesize

              272KB

            • memory/2712-180-0x00000000002A0000-0x00000000002A1000-memory.dmp

              Filesize

              4KB