Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 12:05

General

  • Target

    49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe

  • Size

    964KB

  • MD5

    49b3a9235f8f6ba42f23639245e24def

  • SHA1

    ca3ae9dba6fed3202a5c9dd5a6483dacaa0e5dbc

  • SHA256

    af8f1a41acf398ca367f1b4813f44cac040f442afa5a985f42a514aeb6b238ac

  • SHA512

    aad5e1872ec7c924b80550ffece18502657db56f154e9fac5bb4e0e97aa5e59d850d5c2a41e1e352fee976647868ee2c3619c48d61ef99553b237719812a36ae

  • SSDEEP

    24576:+ER3WHqaSd5V5nUUfy/OdszZ11IwrZQmXMVTzLR:BRmZSd5oh/Od6Z11Cm8r

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3392
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat
          4⤵
            PID:4072
    • C:\Windows\debug\iexplore.exe
      C:\Windows\debug\iexplore.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\debug\iexplore.exe
        C:\Windows\debug\iexplore.exe
        2⤵
        • Executes dropped EXE
        PID:2484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 84
          3⤵
          • Program crash
          PID:3844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2484 -ip 2484
      1⤵
        PID:3688

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE

        Filesize

        1.0MB

        MD5

        25ce0814bb31d1a43a3f75f4e61f81d5

        SHA1

        7270ed5c62d3fa33748036069f49ba54f255473c

        SHA256

        ccd913f7c78fc52387f56bbe09d946ae7633019385a265cbed2d83c4d346d7ed

        SHA512

        11bb2c32cbcf415414ab6c8ad0356c4337173b3b3cf706c944efe5288d6c1ff42858d7bdad6e488b82415f7d1a67dc73f6cfbc7171716981561bd8d148cb84b7

      • C:\Windows\Delete.bat

        Filesize

        160B

        MD5

        986b83f89e84a61179e9a199bf0533eb

        SHA1

        f9af4d9e5efea970a5b02a14c9be533aadb7d07d

        SHA256

        80b9e3d48eea89c021ac38a6a8bcb1381a318e50c152e3c7d4a4f89eb6483b7e

        SHA512

        890c6703e92541ec77b0a8c7c5767f08928dccfc962dc45a31463e8d01d6bef56730d9898acff80065321bf3b45fc480186ea402e5ade8541dd2795214076746

      • memory/684-20-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/684-1-0x00000000010A8000-0x00000000010A9000-memory.dmp

        Filesize

        4KB

      • memory/684-2-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/684-3-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/684-7-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/684-6-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/684-0-0x0000000001000000-0x0000000001100000-memory.dmp

        Filesize

        1024KB

      • memory/2696-24-0x0000000000010000-0x000000000007A000-memory.dmp

        Filesize

        424KB

      • memory/2696-26-0x0000000000640000-0x0000000000641000-memory.dmp

        Filesize

        4KB

      • memory/2696-29-0x0000000000010000-0x000000000007A000-memory.dmp

        Filesize

        424KB

      • memory/3392-16-0x0000000010000000-0x000000001006A000-memory.dmp

        Filesize

        424KB

      • memory/3392-11-0x0000000000710000-0x0000000000711000-memory.dmp

        Filesize

        4KB

      • memory/4972-15-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4972-12-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4972-22-0x0000000002230000-0x0000000002231000-memory.dmp

        Filesize

        4KB

      • memory/4972-21-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4972-14-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4972-32-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB