Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 15:14

General

  • Target

    42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    42379e70bb511d7659943faaa3d84e1c

  • SHA1

    e885091986a50c70e2d6179c3ecddaca1ac1d425

  • SHA256

    15e582c0960adb412c05316336dab08438bf563391e64f636945aa8849251da9

  • SHA512

    dc6ab52e3b85f1cd2a0404984b0775a9647dec61e9a37e8ecbcde177f8b0542633e4c9958c077fd98184e82d75163b87be0edc6762d7ee72b82da5ff53a36042

  • SSDEEP

    3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8W:EuwWx8fScnUPey1BtB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Windows\Fvynua.exe
      C:\Windows\Fvynua.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Fvynua.exe

    Filesize

    125KB

    MD5

    42379e70bb511d7659943faaa3d84e1c

    SHA1

    e885091986a50c70e2d6179c3ecddaca1ac1d425

    SHA256

    15e582c0960adb412c05316336dab08438bf563391e64f636945aa8849251da9

    SHA512

    dc6ab52e3b85f1cd2a0404984b0775a9647dec61e9a37e8ecbcde177f8b0542633e4c9958c077fd98184e82d75163b87be0edc6762d7ee72b82da5ff53a36042

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    390B

    MD5

    1d16fc38b909b01507649d70e3ed09ba

    SHA1

    21b0b7f5a8e3741755968dd38de0407637f03ce1

    SHA256

    d888d76efacf3dfe40496901c4249bfdfb6d198ef30cfaf1f3f5471c24b604ff

    SHA512

    0ca1f7b779d12f40dea5fd27e46a8445f5f02ddf7474da57e89c24088574fc8a5c9d7ad5eaefb0c571f1e2be5c0e7b9ca02c1314e2e1516ee7e69fbe590892d8

  • memory/4128-121838-0x0000000001F10000-0x0000000001F3E000-memory.dmp

    Filesize

    184KB

  • memory/4128-9-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-8-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-121837-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-121841-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-121843-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-121845-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-121850-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4128-121858-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4924-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4924-121836-0x00000000006B0000-0x00000000006DE000-memory.dmp

    Filesize

    184KB

  • memory/4924-121835-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4924-0-0x00000000006E0000-0x00000000006F3000-memory.dmp

    Filesize

    76KB