Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 17:37

General

  • Target

    4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe

  • Size

    2.7MB

  • MD5

    4ab652832cdc5af68b9ee33ba38244da

  • SHA1

    0c7c93dffe504f938581ff31ae686ab8c3fffb59

  • SHA256

    3473f77b57fca529f09445d2b1180bd7464aa8f764e9483284e0edabce443ba7

  • SHA512

    4af14e1127ca66909e0bab1d405fd3c83c6c67795a3bf94fcefba8e357ae3db2d7294245d8e0c2eeaeb0b79b9c36a7deaba2d9fdce8209e63cd51063e1891f80

  • SSDEEP

    49152:RqoScPNKcisM2pX/2Auz9ZcXl2pX/2Kg8ITzuD9bzUtKEIHOAs8PSNKDJmr+:RbdPysMAez9slAOIUkEIHS8akDIr+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\Temp\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe" C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 356
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:840

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\4ab652832cdc5af68b9ee33ba38244da_JaffaCakes118.exe

          Filesize

          494KB

          MD5

          26eef90925397178d9b0d15a8b4c59a2

          SHA1

          56dc940d14d1ff6c7758b3dc802fd7dde58d2761

          SHA256

          78bd9ade1bc33445b82833c5038314b0bda9fafa7680361fa39484c6f3916e30

          SHA512

          ebc3ea2e59456ad24b4593799623a380f84025a6268b9c0c19b2deb430901837ca37c2c13c65d065175e908eb9300170b060a875a08d40d93fdedaa10e4f7731

        • C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\AppData\Heart.png

          Filesize

          8KB

          MD5

          5fa2f7bfd57bdf04e7932ee8d5297fc7

          SHA1

          151cf11d772c2d0447447cd851c92880f04f5556

          SHA256

          d87de3c5d92373670d0dcadee4c010a249261739da5b5d1861920a4bc1ab2a60

          SHA512

          6d4fd7288f10d27af22868c8bbfaa9f3bbbfd0bcc124fb263d883eacc7c2382647d323c3fff0b712cc822b5efe02779b8484d1722ef76166ed2e5e37af032650

        • C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\AppData\package2.ini

          Filesize

          5KB

          MD5

          997ffd213d99cd1fd393ebe73cd5bc39

          SHA1

          819fe362e855e04ddf89335ce24853c5593f6258

          SHA256

          0c347fabb4d6349eded6f77fe9ea0e68457e2691bd95b5a0cdd65eb9af2fdacf

          SHA512

          c8157ea4c274c50e7e13274582ff4a4bcd8752eafbdaf32fb559e3a971dd7d967510508573b1fb9985dd5c297f70471954c70d82d3e119d4eb25efcbe3d5f33e

        • C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\AppData\{DABA1C52-4ED1-4F3F-9E0E-A8D9DF587538}.DXScript2

          Filesize

          1KB

          MD5

          7a583db80ae38ff5835fbedd2081f67f

          SHA1

          59586ea1db2666af15c69fde1aec5fd0c57b18d8

          SHA256

          d3c4e5415ed7f0973ff7e75f1f6d21f5afbf0cd04ae1e4ab469af47c678e35b0

          SHA512

          9f8147e4d676c139971c123416992ba0e1eff6e40c32fb8ea048960579e7befde47688d5396677b350e2476724a3430eb6916fe1a54b22fd632a705e3a5b123f

        • C:\Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\AppData\{EF3D7B15-3F24-49C3-8788-DC4051CF392D}.DXScript2

          Filesize

          7KB

          MD5

          2bf7029d589ec8293bd0a2fd5ccb8cf7

          SHA1

          26ef40dbfe07908252cfef69e335f4eb1f1ad0e7

          SHA256

          e89a197c6d007145679ba909146d369966b28edeb3d14c974d68bcbc98d79426

          SHA512

          94587e5940d5525bbb84dd3a4b8b2d55d7e6169da28bf9680082c9e25308ddfefb1d7e066f474b05e880c5befc3347d781fc7fdd98a1014f1f0222983a8a7434

        • \Users\Admin\AppData\Local\Temp\{242EF421-B351-429C-B986-3B1EB239CB8D}\SDPlugins\DXAxHost.dll

          Filesize

          319KB

          MD5

          f6cf6f1cffde0f257497063f97cbbdf7

          SHA1

          c0b47b353b1ff1a29eb33337e8f0570e622f14c7

          SHA256

          f9503fc0a2c0dd5f0aa93af34274d284cf37b4eed332dfb9c1fe4daa7535d7fb

          SHA512

          edfc3526995ab1b326fc795e2f4e2e2d43794960c2ebf3a42731b0295af802c04762ff765cf141a27e4427cfbc22a922d24adf182cb2e3c71d3ae4d41883d4fd