Analysis

  • max time kernel
    142s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 03:14

General

  • Target

    440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe

  • Size

    249KB

  • MD5

    440f9131d1a3615aa10836424b4d3134

  • SHA1

    0f1353fd4ac77e4c98903b710870bb2067835c0d

  • SHA256

    d40f089fa61aedc4658f041eb95d91d404f52b432b96b696e91854c7a970e86e

  • SHA512

    45ec3693537f10c13c3f1037334041be4adffc54332837f7a41f4e744bdcd15b3bfa54dd9c1b156346cdd2fcb73dc244f3ec7b9818fbc165426191ea9bce5da6

  • SSDEEP

    6144:pPi2fsaw6DaWVrDK04HPHylBRgINp0Vgj:Upwm4K9PHUQEp08

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\440f9131d1a3615aa10836424b4d3134_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Program Files\NetMeeting\system.exe
      "C:\Program Files\NetMeeting\system.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Program Files\Messenger\SVCH0ST.EXE
        "C:\Program Files\Messenger\SVCH0ST.EXE"
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:1636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Messenger\SVCH0ST.EXE

          Filesize

          201KB

          MD5

          1e0eb07e2e6f297a7b9384a2931e35b4

          SHA1

          8c5e568d4366ac33c45bc7b2264316c02fe14148

          SHA256

          1e12ebd50990bada4dd8ae6e3a83b35d1cafb29e0cd819d139b7bbe2d7f87805

          SHA512

          99a6cf9c3c4f7c794582836e472090609adf7b40a442d0e8eb6ffb94167009562d12eda627809ca41e9186864b2ff00229e2f8cf4ed051495f40cef5937b488a

        • C:\Program Files\NetMeeting\nmasu.dll

          Filesize

          222KB

          MD5

          5446efc59699da00431c074ef7fa70fd

          SHA1

          93fc96aaca1a229476fcefe74903a2341268e897

          SHA256

          02321c8072f8348c74ae79e4c0c4b098d074acea429a263ca257badedc01b80d

          SHA512

          b3d9c6f3983e17b0e3aa1d891c5b24117e206e7d06a6de725cf2219769f26756d68e86fa8d06d6cb0b88ae43378001d1966169a587cda6d382513500c8a2b2dc

        • C:\Program Files\NetMeeting\system.exe

          Filesize

          249KB

          MD5

          440f9131d1a3615aa10836424b4d3134

          SHA1

          0f1353fd4ac77e4c98903b710870bb2067835c0d

          SHA256

          d40f089fa61aedc4658f041eb95d91d404f52b432b96b696e91854c7a970e86e

          SHA512

          45ec3693537f10c13c3f1037334041be4adffc54332837f7a41f4e744bdcd15b3bfa54dd9c1b156346cdd2fcb73dc244f3ec7b9818fbc165426191ea9bce5da6

        • memory/1636-32-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/1636-21-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

          Filesize

          4KB

        • memory/1636-19-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/4456-14-0x0000000002220000-0x0000000002271000-memory.dmp

          Filesize

          324KB

        • memory/4456-15-0x00000000005B0000-0x00000000005B3000-memory.dmp

          Filesize

          12KB

        • memory/4456-6-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/4456-31-0x0000000002220000-0x0000000002271000-memory.dmp

          Filesize

          324KB

        • memory/4456-30-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/4456-33-0x00000000005B0000-0x00000000005B3000-memory.dmp

          Filesize

          12KB

        • memory/4456-51-0x0000000002220000-0x0000000002271000-memory.dmp

          Filesize

          324KB

        • memory/4456-50-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/4860-0-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/4860-29-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB