Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 09:31

General

  • Target

    411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe

  • Size

    620KB

  • MD5

    411fcde0244d47f1c12e35c03fcdcf9d

  • SHA1

    7e56209cbdcfdcfba8c76f26007ea4e580acee2e

  • SHA256

    27545699d7d71650d09043186c5039531c617b8c66a6e3dd8c9ba451933ce42d

  • SHA512

    15fc53e5bfd586f4d7c84c0489f029ef05a2f2c48175bbfe5b4a7ab188c02b96a2b2416c68a58e5265f3fb31575482f22878a09c076f7bec487f339c05189827

  • SSDEEP

    12288:l1X4clDdgZMwczTRO+G7VxxUHHWKHVxylzaJfyBeTe/z/JbQp:T7EZM3xIZOVSEJfyBa8TJ

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Users\Admin\AppData\Local\writer.exe
        "C:\Users\Admin\AppData\Local\writer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Users\Admin\AppData\Local\writer.exe
          "C:\Users\Admin\AppData\Local\writer.exe"
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\writer.exe

    Filesize

    620KB

    MD5

    411fcde0244d47f1c12e35c03fcdcf9d

    SHA1

    7e56209cbdcfdcfba8c76f26007ea4e580acee2e

    SHA256

    27545699d7d71650d09043186c5039531c617b8c66a6e3dd8c9ba451933ce42d

    SHA512

    15fc53e5bfd586f4d7c84c0489f029ef05a2f2c48175bbfe5b4a7ab188c02b96a2b2416c68a58e5265f3fb31575482f22878a09c076f7bec487f339c05189827

  • memory/1800-5-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1800-9-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1800-2-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1800-18-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1800-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1800-8-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1800-7-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2180-19-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB

  • memory/2180-31-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB

  • memory/2208-32-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2208-29-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2208-33-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2208-34-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2208-35-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2416-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2416-6-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB