Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 18:48

General

  • Target

    42e800f562b0598039593c5365ff9e26_JaffaCakes118.exe

  • Size

    359KB

  • MD5

    42e800f562b0598039593c5365ff9e26

  • SHA1

    a2976516a6fc76125c3e3894014d36eede8f1c00

  • SHA256

    4674c8f7f10851b1abce7c24b48c1f334a992f09d7b28fe529ea84c4e7470d3a

  • SHA512

    a350bb6c43ef0b33f93fa3a4fc466761f6aa785d49fda760578d2749fca9c48a22bdbfb5bbd63324c0330d845bf0b9298f53f2271c7ba12575f7d64868f6f9bf

  • SSDEEP

    6144:X/vOM65ERltmlY424i31rZzd6ifcDjgftcWz808aBqpLlEoS4a:XHOrChB5/6ifusz8kqpSoS1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42e800f562b0598039593c5365ff9e26_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\42e800f562b0598039593c5365ff9e26_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\42e800f562b0598039593c5365ff9e26_JaffaCakes118.data

    Filesize

    854B

    MD5

    d607d446ff50c1188d6f96188ab53318

    SHA1

    db3d6090c0cfa3337407a1661a68568a1a77436b

    SHA256

    a1feb26ad016c39f8a3a8144a52f1a7c2875bd99c58c9315b509bf5996c32a3e

    SHA512

    287c509fe575c0fb21895e99317075efb63f779faed5eb58a83ee601badb5a1840fa6cb29b4052d902dccabc235de39d63af92b938dc20d5e81dc00f747b5082

  • memory/2064-0-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-13-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-15-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-34-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-56-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-62-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-63-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-65-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-70-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-71-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB

  • memory/2064-76-0x0000000000400000-0x000000000050E000-memory.dmp

    Filesize

    1.1MB