Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 04:49

General

  • Target

    48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe

  • Size

    56KB

  • MD5

    48496997af0bd62cf6167738e32d5fb9

  • SHA1

    b3f44b4175f955e68c434e023746badf43e34f9d

  • SHA256

    b139a58689248ad7ff7dc5d235125c58219d4473942cd70a7538feb4fa47f5ac

  • SHA512

    b9861888ed0dc9f63f8480da13e8406223d406c9d31a03a61464c7616dd364fbcb7d7c3081e81feba66a8cc2e88d1b72829a39649e7b2626f31933a82ab021c5

  • SSDEEP

    768:3nH5P/kv6gJ9ECY5f0mq/6/Q/9NF0+LEc8af3ts0E9t:3hkb0Coq2oS+Ljb3ts0E9t

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\mwrioy.exe
      "C:\Users\Admin\mwrioy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2368

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\mwrioy.exe

          Filesize

          56KB

          MD5

          59d10535e10d479c49830ec0f2b5047f

          SHA1

          6de7ded41195027bfc1667a8a09ec4f78b82ae1d

          SHA256

          c68cdea5337ef733c58c10c578c62b91a6f27de40c40164dcf08ae0ef93ace8d

          SHA512

          a793a88959791f7eb615ddd5b6de7ad9ab8301231c6770213ae8bde937518fdf417d372b59a8507867a0c6f9273eb7c617fecb34c0b214115d0087adac80df48