Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 18:55

General

  • Target

    3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    3e7cfb168cef65a018133960b836a45a

  • SHA1

    cd810652818ff8065f26495fd9cb19f8d78d0de2

  • SHA256

    6bf0d7d379114b634766666c9be5f6ae874c82bea5ccfaf3fed5d6d07567f11b

  • SHA512

    ac366335f6ec432a53a4895990d9543dc81d45f323966e79eb4bbb85519fd62884a1df9fc74966ca0a9037c312efd2a5a633cb6c88823d400cc84d6d498c2e7c

  • SSDEEP

    24576:8naNm1/fqXfnug9LzaopbMIh5jOln8K/3CrcoFfvxjtN/5ci2W1G:8aAJfqP99LrFUqWyrD5ZNX2WG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\is-P0C7Q.tmp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-P0C7Q.tmp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp" /SL5="$400F4,867093,166400,C:\Users\Admin\AppData\Local\Temp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-P0C7Q.tmp\3e7cfb168cef65a018133960b836a45a_JaffaCakes118.tmp

    Filesize

    797KB

    MD5

    7e00d5a59d18abb094979857a4495518

    SHA1

    f7cdccd9a03a260c7d0b724df5fee2ee1dcb22d6

    SHA256

    eef170da7985900955d7fe4229c136045fc4bfc7a350a033d484b0cc4c82cb08

    SHA512

    5697e7b6a30df3f74c7d469fac0d02717cbc9511a0681cc9d65032a50124ca572584f80ab9b39fca7a74ce76a0e01cbb63bdd1f66d39be3f48beb2b362120492

  • \Users\Admin\AppData\Local\Temp\is-PU603.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/2304-15-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2304-17-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2400-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2400-0-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2400-16-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB