Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 21:50

General

  • Target

    4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe

  • Size

    256KB

  • MD5

    4b8e2c9c30dec03ab45018d24461f18b

  • SHA1

    32b2faa5f1f9e41a8feccb16d819690281a58940

  • SHA256

    a06ca1c35c95a074a180b3792600a97776affa028ef128f5a26e699b94634233

  • SHA512

    3d8f0f663ba215cd72607265bd639c63314998c0b85643fbdef825ce5c6315566cf01bd354987ee4ba4d1a159b37fd19efe346408235dca509972174a50a1421

  • SSDEEP

    6144:eYBkl24UDDr8cAUJ16WH67T54LZ07M4M8NVbyb:nBkSDn8UJk8uTS90oGvbc

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1196
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1280
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1324
          • C:\Users\Admin\AppData\Local\Temp\4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\4b8e2c9c30dec03ab45018d24461f18b_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Users\Admin\AppData\Roaming\Noyba\iralr.exe
              "C:\Users\Admin\AppData\Roaming\Noyba\iralr.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2768
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2418b468.bat"
              3⤵
              • Deletes itself
              PID:2824
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1292

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp2418b468.bat

            Filesize

            271B

            MD5

            cc46b1a85c2c54a6f71363b99daa0c86

            SHA1

            7ae230ce178dd82b32b48aa519826755dfb2135f

            SHA256

            8263f4f253e4ff08b97063b7922215987e22434fc8f6d849f4436292cb18cefc

            SHA512

            95f1715c4fa779384e91a6f3eda8f298c92e283aec8c0b283f381cbbb946dfdcece9b04828d59d5eede47aac709f2789ae35841abb31303e8cc4f5a9f10a67b2

          • C:\Users\Admin\AppData\Roaming\Noyba\iralr.exe

            Filesize

            256KB

            MD5

            4545376bc6e2abc704adb59bbbc2ab0c

            SHA1

            641e0f0cbbfa841cdd25b3cd45759e05343099a2

            SHA256

            989851b16da60f343ab743e584f39deeab5f76c1ec135071112af00af0b24bfc

            SHA512

            c161ff98d2ba2fc6d8408670bdf75c032a23b0821ad018ae910706ce387b8c484ba4340719d90837552fce79c771e86f1dac8a4c06df9003b86c6849fe7374f1

          • memory/1196-21-0x00000000020F0000-0x000000000212F000-memory.dmp

            Filesize

            252KB

          • memory/1196-23-0x00000000020F0000-0x000000000212F000-memory.dmp

            Filesize

            252KB

          • memory/1196-25-0x00000000020F0000-0x000000000212F000-memory.dmp

            Filesize

            252KB

          • memory/1196-17-0x00000000020F0000-0x000000000212F000-memory.dmp

            Filesize

            252KB

          • memory/1196-19-0x00000000020F0000-0x000000000212F000-memory.dmp

            Filesize

            252KB

          • memory/1280-31-0x0000000001D90000-0x0000000001DCF000-memory.dmp

            Filesize

            252KB

          • memory/1280-29-0x0000000001D90000-0x0000000001DCF000-memory.dmp

            Filesize

            252KB

          • memory/1280-30-0x0000000001D90000-0x0000000001DCF000-memory.dmp

            Filesize

            252KB

          • memory/1280-28-0x0000000001D90000-0x0000000001DCF000-memory.dmp

            Filesize

            252KB

          • memory/1292-38-0x0000000001E90000-0x0000000001ECF000-memory.dmp

            Filesize

            252KB

          • memory/1292-41-0x0000000001E90000-0x0000000001ECF000-memory.dmp

            Filesize

            252KB

          • memory/1292-40-0x0000000001E90000-0x0000000001ECF000-memory.dmp

            Filesize

            252KB

          • memory/1292-39-0x0000000001E90000-0x0000000001ECF000-memory.dmp

            Filesize

            252KB

          • memory/1324-36-0x00000000029C0000-0x00000000029FF000-memory.dmp

            Filesize

            252KB

          • memory/1324-35-0x00000000029C0000-0x00000000029FF000-memory.dmp

            Filesize

            252KB

          • memory/1324-33-0x00000000029C0000-0x00000000029FF000-memory.dmp

            Filesize

            252KB

          • memory/1324-34-0x00000000029C0000-0x00000000029FF000-memory.dmp

            Filesize

            252KB

          • memory/2716-134-0x0000000076FB0000-0x0000000076FB1000-memory.dmp

            Filesize

            4KB

          • memory/2716-77-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-63-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-61-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-59-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-57-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-55-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-50-0x0000000000480000-0x00000000004BF000-memory.dmp

            Filesize

            252KB

          • memory/2716-48-0x0000000000480000-0x00000000004BF000-memory.dmp

            Filesize

            252KB

          • memory/2716-46-0x0000000000480000-0x00000000004BF000-memory.dmp

            Filesize

            252KB

          • memory/2716-44-0x0000000000480000-0x00000000004BF000-memory.dmp

            Filesize

            252KB

          • memory/2716-67-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-69-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-73-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-75-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-65-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-79-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-135-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-1-0x0000000000330000-0x0000000000376000-memory.dmp

            Filesize

            280KB

          • memory/2716-53-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-71-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2716-0-0x00000000002F0000-0x000000000032F000-memory.dmp

            Filesize

            252KB

          • memory/2716-158-0x0000000000330000-0x0000000000376000-memory.dmp

            Filesize

            280KB

          • memory/2716-6-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2716-2-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2716-3-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2716-159-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2768-14-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2768-15-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2768-278-0x0000000000400000-0x0000000000446000-memory.dmp

            Filesize

            280KB

          • memory/2768-279-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB