Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 03:14

General

  • Target

    440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe

  • Size

    249KB

  • MD5

    440f9131d1a3615aa10836424b4d3134

  • SHA1

    0f1353fd4ac77e4c98903b710870bb2067835c0d

  • SHA256

    d40f089fa61aedc4658f041eb95d91d404f52b432b96b696e91854c7a970e86e

  • SHA512

    45ec3693537f10c13c3f1037334041be4adffc54332837f7a41f4e744bdcd15b3bfa54dd9c1b156346cdd2fcb73dc244f3ec7b9818fbc165426191ea9bce5da6

  • SSDEEP

    6144:pPi2fsaw6DaWVrDK04HPHylBRgINp0Vgj:Upwm4K9PHUQEp08

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Program Files\NetMeeting\system.exe
      "C:\Program Files\NetMeeting\system.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Program Files\Messenger\SVCH0ST.EXE
        "C:\Program Files\Messenger\SVCH0ST.EXE"
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Messenger\SVCH0ST.EXE

    Filesize

    201KB

    MD5

    1e0eb07e2e6f297a7b9384a2931e35b4

    SHA1

    8c5e568d4366ac33c45bc7b2264316c02fe14148

    SHA256

    1e12ebd50990bada4dd8ae6e3a83b35d1cafb29e0cd819d139b7bbe2d7f87805

    SHA512

    99a6cf9c3c4f7c794582836e472090609adf7b40a442d0e8eb6ffb94167009562d12eda627809ca41e9186864b2ff00229e2f8cf4ed051495f40cef5937b488a

  • \Program Files\NetMeeting\nmasu.dll

    Filesize

    222KB

    MD5

    5446efc59699da00431c074ef7fa70fd

    SHA1

    93fc96aaca1a229476fcefe74903a2341268e897

    SHA256

    02321c8072f8348c74ae79e4c0c4b098d074acea429a263ca257badedc01b80d

    SHA512

    b3d9c6f3983e17b0e3aa1d891c5b24117e206e7d06a6de725cf2219769f26756d68e86fa8d06d6cb0b88ae43378001d1966169a587cda6d382513500c8a2b2dc

  • \Program Files\NetMeeting\system.exe

    Filesize

    249KB

    MD5

    440f9131d1a3615aa10836424b4d3134

    SHA1

    0f1353fd4ac77e4c98903b710870bb2067835c0d

    SHA256

    d40f089fa61aedc4658f041eb95d91d404f52b432b96b696e91854c7a970e86e

    SHA512

    45ec3693537f10c13c3f1037334041be4adffc54332837f7a41f4e744bdcd15b3bfa54dd9c1b156346cdd2fcb73dc244f3ec7b9818fbc165426191ea9bce5da6

  • memory/1988-27-0x0000000000450000-0x00000000004D3000-memory.dmp

    Filesize

    524KB

  • memory/1988-40-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1988-13-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1988-19-0x00000000003E0000-0x00000000003E3000-memory.dmp

    Filesize

    12KB

  • memory/1988-17-0x0000000000380000-0x00000000003D1000-memory.dmp

    Filesize

    324KB

  • memory/1988-60-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1988-29-0x0000000000450000-0x00000000004D3000-memory.dmp

    Filesize

    524KB

  • memory/1988-43-0x00000000003E0000-0x00000000003E3000-memory.dmp

    Filesize

    12KB

  • memory/1988-61-0x0000000000380000-0x00000000003D1000-memory.dmp

    Filesize

    324KB

  • memory/1988-41-0x0000000000380000-0x00000000003D1000-memory.dmp

    Filesize

    324KB

  • memory/2316-0-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2316-39-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2316-10-0x0000000000330000-0x0000000000380000-memory.dmp

    Filesize

    320KB

  • memory/2316-11-0x0000000000330000-0x0000000000380000-memory.dmp

    Filesize

    320KB

  • memory/2656-31-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2656-42-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2656-30-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB