Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 06:52

General

  • Target

    409ff6b9bec974f22a0f5175d1b18ff6_JaffaCakes118.exe

  • Size

    38KB

  • MD5

    409ff6b9bec974f22a0f5175d1b18ff6

  • SHA1

    014fa13f929a60cfbe5ce7948d07bfe309c997aa

  • SHA256

    26ddf9211b678d912468e39d3831e95e6849a2a0165fea4ffcf47dddda066f2a

  • SHA512

    958d06b2f9e01f0132f44e299925602cf158648698aac12cb7595dba9cb19bbc9af5e544fde09ac2c6344954272b0929605542d47bd40cc9e0388ef8c797d7f0

  • SSDEEP

    768:/sL5jeeD/pjm85XLgajTQIfnFqA+9hLh7D5GCK1O:/sNjeCf5UanQIfFqA+995EO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\409ff6b9bec974f22a0f5175d1b18ff6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\409ff6b9bec974f22a0f5175d1b18ff6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\2B45.tmp\start.bat" "
      2⤵
        PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2B45.tmp\start.bat

      Filesize

      20B

      MD5

      f005874651c4ebc7634859b5374d6934

      SHA1

      ddde28f08e0e8ee7112a08ef510eb718b1e4b462

      SHA256

      d9da2a024a28736e10545948559b13c575f3d139b9084131435ab35a1352a6d3

      SHA512

      8daac30649f3047b3c2183fe5f03f39c445d7998533644f7d85d41168d73c4911d4a3347af924c12fa65aad65c1dbacff0eb2014ff176a17c61c10cfb8fdde0c

    • memory/2668-26-0x0000000000700000-0x0000000000701000-memory.dmp

      Filesize

      4KB

    • memory/2772-0-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2772-31-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2772-35-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB