Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 03:06

General

  • Target

    3ff19166bc94bbfd22757c747b06e649_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    3ff19166bc94bbfd22757c747b06e649

  • SHA1

    a8d883bfd4eb146f070ece390f325c7327d4723d

  • SHA256

    964c3f3dfb1f05cf4a21a34e951a7b44caa968bb14bf5168ef12d6b184411c1d

  • SHA512

    821bc1527a398877d59ff27ab0e2839b82681c9d7bc7ba875f8167b814bd02a98b04f279966c3f88b93f99c8a02e908b7e01ed5305f1ed3d52e47a55fa7f38e1

  • SSDEEP

    192:OLz7qThUF1meonxgssqVUWIFBzaChowRZ5IggoMR2ILCGSNqrGw3KwYWVMXlcrw:O/chbeoxgRomFx2wXGggoMRRsoGQtY1

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ff19166bc94bbfd22757c747b06e649_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ff19166bc94bbfd22757c747b06e649_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\lenowosk.exe
      C:\Windows\system32\lenowosk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:1276
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\3ff19166bc94bbfd22757c747b06e649_JaffaCakes118.exe.bat
      2⤵
      • Deletes itself
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3ff19166bc94bbfd22757c747b06e649_JaffaCakes118.exe.bat

    Filesize

    210B

    MD5

    b645ebd478e8357faed059d413e1ef13

    SHA1

    539f546904f7d9cef0de9d5e8b9c80945d5cb94b

    SHA256

    7154aa388442f7eb263ca20d6c9cfb36a1934a8e2232521a698aa0c0d1ffef4a

    SHA512

    2118184d2b9804eff3d0e20c0515405be5009f4f785607945aaf8d64ec90c025baaf94613f7f793a0b4cba8472f87fd693002d10b6c57f5d94feebd92273e46f

  • \Windows\SysWOW64\lenowosk.exe

    Filesize

    14KB

    MD5

    3ff19166bc94bbfd22757c747b06e649

    SHA1

    a8d883bfd4eb146f070ece390f325c7327d4723d

    SHA256

    964c3f3dfb1f05cf4a21a34e951a7b44caa968bb14bf5168ef12d6b184411c1d

    SHA512

    821bc1527a398877d59ff27ab0e2839b82681c9d7bc7ba875f8167b814bd02a98b04f279966c3f88b93f99c8a02e908b7e01ed5305f1ed3d52e47a55fa7f38e1

  • memory/1276-13-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2488-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2488-10-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB

  • memory/2488-9-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB

  • memory/2488-12-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2488-14-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB

  • memory/2488-17-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB