Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 03:06

General

  • Target

    47f2aef9e504169674aea180d52f1dc9_JaffaCakes118.exe

  • Size

    713KB

  • MD5

    47f2aef9e504169674aea180d52f1dc9

  • SHA1

    25453697c013e031a4b45a8c8ec2bd6e33b1fd34

  • SHA256

    d2477a8eb8bc8c136be97bbe396f1dc811c9bc60561c1d41fdef36a0cc37b7f0

  • SHA512

    5f49a5a3bc8cc84a85eda0ebb3a305efee9b6d41ddb3467b28f343f740465f2033268f3d5532e8e73ac76c401a9e065e2396a6b726f3c9e9f247806ae8086a89

  • SSDEEP

    12288:UsAL/W5L/SZdSCvTF+bDTqXTa7v5ouBsmtGnt8MIcTUIvZqslXqzvMR0drbi/:UsW/WNSZ8CLGETEjunt8xcZxqs4z0R0Q

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47f2aef9e504169674aea180d52f1dc9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\47f2aef9e504169674aea180d52f1dc9_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:5060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 700
      2⤵
      • Program crash
      PID:1392
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5060 -ip 5060
    1⤵
      PID:3256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\concp32.exe

      Filesize

      716KB

      MD5

      0ea31aba5280665b3b4cf028a04d5a5f

      SHA1

      cc71af2f04779f24480379fd2b4357bc477aa979

      SHA256

      694281e53d58692194fbb57db1208151cffbd8ce9ef11e186a4f138133694232

      SHA512

      a65b886eb5f759ecd980062a8e235ffd26a47662d3d02f631ef66aa2f316b151c94cf019e1f336aef05de9cb20b1ae630e784c2f6b4b7a2282a63debc3d58846

    • memory/5060-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5060-7-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB