Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 12:05

General

  • Target

    49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe

  • Size

    964KB

  • MD5

    49b3a9235f8f6ba42f23639245e24def

  • SHA1

    ca3ae9dba6fed3202a5c9dd5a6483dacaa0e5dbc

  • SHA256

    af8f1a41acf398ca367f1b4813f44cac040f442afa5a985f42a514aeb6b238ac

  • SHA512

    aad5e1872ec7c924b80550ffece18502657db56f154e9fac5bb4e0e97aa5e59d850d5c2a41e1e352fee976647868ee2c3619c48d61ef99553b237719812a36ae

  • SSDEEP

    24576:+ER3WHqaSd5V5nUUfy/OdszZ11IwrZQmXMVTzLR:BRmZSd5oh/Od6Z11Cm8r

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\Delete.bat
          4⤵
            PID:2536
    • C:\Windows\debug\iexplore.exe
      C:\Windows\debug\iexplore.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\debug\iexplore.exe
        C:\Windows\debug\iexplore.exe
        2⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of FindShellTrayWindow
        PID:2784
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x51c
      1⤵
        PID:2652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Delete.bat

        Filesize

        160B

        MD5

        986b83f89e84a61179e9a199bf0533eb

        SHA1

        f9af4d9e5efea970a5b02a14c9be533aadb7d07d

        SHA256

        80b9e3d48eea89c021ac38a6a8bcb1381a318e50c152e3c7d4a4f89eb6483b7e

        SHA512

        890c6703e92541ec77b0a8c7c5767f08928dccfc962dc45a31463e8d01d6bef56730d9898acff80065321bf3b45fc480186ea402e5ade8541dd2795214076746

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE

        Filesize

        1.0MB

        MD5

        25ce0814bb31d1a43a3f75f4e61f81d5

        SHA1

        7270ed5c62d3fa33748036069f49ba54f255473c

        SHA256

        ccd913f7c78fc52387f56bbe09d946ae7633019385a265cbed2d83c4d346d7ed

        SHA512

        11bb2c32cbcf415414ab6c8ad0356c4337173b3b3cf706c944efe5288d6c1ff42858d7bdad6e488b82415f7d1a67dc73f6cfbc7171716981561bd8d148cb84b7

      • memory/2028-2-0x00000000009C0000-0x00000000009C1000-memory.dmp

        Filesize

        4KB

      • memory/2028-1-0x0000000000500000-0x0000000000554000-memory.dmp

        Filesize

        336KB

      • memory/2028-9-0x0000000000A00000-0x0000000000A01000-memory.dmp

        Filesize

        4KB

      • memory/2028-8-0x00000000009D0000-0x00000000009D1000-memory.dmp

        Filesize

        4KB

      • memory/2028-7-0x00000000009E0000-0x00000000009E1000-memory.dmp

        Filesize

        4KB

      • memory/2028-12-0x0000000003160000-0x0000000003260000-memory.dmp

        Filesize

        1024KB

      • memory/2028-20-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2028-19-0x0000000003180000-0x0000000003181000-memory.dmp

        Filesize

        4KB

      • memory/2028-18-0x0000000003190000-0x0000000003191000-memory.dmp

        Filesize

        4KB

      • memory/2028-17-0x00000000031A0000-0x00000000031A1000-memory.dmp

        Filesize

        4KB

      • memory/2028-16-0x0000000000160000-0x0000000000161000-memory.dmp

        Filesize

        4KB

      • memory/2028-15-0x0000000003160000-0x0000000003163000-memory.dmp

        Filesize

        12KB

      • memory/2028-14-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2028-0-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/2028-6-0x0000000000930000-0x0000000000931000-memory.dmp

        Filesize

        4KB

      • memory/2028-5-0x0000000000980000-0x0000000000981000-memory.dmp

        Filesize

        4KB

      • memory/2028-4-0x00000000009F0000-0x00000000009F1000-memory.dmp

        Filesize

        4KB

      • memory/2028-3-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/2028-11-0x0000000003160000-0x0000000003260000-memory.dmp

        Filesize

        1024KB

      • memory/2028-10-0x0000000000990000-0x0000000000991000-memory.dmp

        Filesize

        4KB

      • memory/2028-13-0x0000000003160000-0x0000000003260000-memory.dmp

        Filesize

        1024KB

      • memory/2028-41-0x0000000000500000-0x0000000000554000-memory.dmp

        Filesize

        336KB

      • memory/2028-42-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/2196-30-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2196-38-0x0000000010000000-0x000000001006A000-memory.dmp

        Filesize

        424KB

      • memory/2692-51-0x0000000000290000-0x0000000000291000-memory.dmp

        Filesize

        4KB

      • memory/2692-59-0x0000000000010000-0x000000000007A000-memory.dmp

        Filesize

        424KB

      • memory/2692-49-0x0000000000010000-0x000000000007A000-memory.dmp

        Filesize

        424KB

      • memory/2728-34-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2728-43-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2728-33-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2728-40-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2728-44-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2728-70-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2728-36-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2728-45-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2784-69-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2784-55-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2784-72-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB