Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 11:19

General

  • Target

    45956f8c389a08115a075905420893cc_JaffaCakes118.exe

  • Size

    69KB

  • MD5

    45956f8c389a08115a075905420893cc

  • SHA1

    15c3f5d618ae9741f0c107d26e0569b5d0e506e7

  • SHA256

    d113cc1b713c10465bbeb5fbfabc6ff01c313bfb2aaec4679d6a59e877be27ec

  • SHA512

    34a99e517380c58357966787532f7d31cfc8ced700f877aef8fe8ff363b97ca2f2956e76671228e006dcf38d2cb2c0849e75417ca0b2a899d04b6684fb65778c

  • SSDEEP

    1536:lmqSQ5X9SQxNzNBNiuETr3PcT1/djHKlnEx:2MXEQxlhiBPcT1/9HKFEx

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45956f8c389a08115a075905420893cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45956f8c389a08115a075905420893cc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\45956f8c389a08115a075905420893cc_JaffaCakes118.exe" "C:\temp170.tmp"
      2⤵
        PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\45956f8c389a08115a075905420893cc_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        2⤵
        • Drops startup file
        PID:1664
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe" "C:\temp3672.tmp"
          3⤵
            PID:2824

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\temp170.tmp

        Filesize

        69KB

        MD5

        45956f8c389a08115a075905420893cc

        SHA1

        15c3f5d618ae9741f0c107d26e0569b5d0e506e7

        SHA256

        d113cc1b713c10465bbeb5fbfabc6ff01c313bfb2aaec4679d6a59e877be27ec

        SHA512

        34a99e517380c58357966787532f7d31cfc8ced700f877aef8fe8ff363b97ca2f2956e76671228e006dcf38d2cb2c0849e75417ca0b2a899d04b6684fb65778c

      • memory/2352-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-13-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-14-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-15-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-16-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-17-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-18-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-19-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-20-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-21-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-22-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-23-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-24-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2760-25-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB