Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 14:52

General

  • Target

    3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe

  • Size

    142KB

  • MD5

    3dd29d6a10609b2f55c038fd50132ce3

  • SHA1

    8c7323c52edfea158713c08d70b1c85020f5e776

  • SHA256

    c7f15685ccc4cf8354cf4f1590d7577f4bbf8781a3494ca5c6d982fa5cf7e073

  • SHA512

    2ec3f3643e3ba84d504ec31fdde15619e46035e075303c978c815603e5057b35a895cf4a772418b66c2949af8ab177f6251d0f42bc89f1d2fd4de27afbc319f7

  • SSDEEP

    3072:nPC+w9KM+lbMnqYgQnVu+VZkFC8f1ViHbfH7AXhZNm0h+Md1/lkzL+:a4lbe5xkl1V88xnNkzL

Score
7/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Print Processors
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3028-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/3028-3-0x0000000076EC0000-0x0000000076EC1000-memory.dmp

    Filesize

    4KB

  • memory/3028-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3028-6-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB