Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 17:42

General

  • Target

    4aba75bff87a49ead0e3805e893d3293_JaffaCakes118.exe

  • Size

    22KB

  • MD5

    4aba75bff87a49ead0e3805e893d3293

  • SHA1

    522b2152c52d1ce45e232ab10a738c19ff3abb0a

  • SHA256

    70e35260a3653775d66650a0b533d689a40ba1a2b711d7fa63f6d359e15c6c5a

  • SHA512

    eaae5f11ced462d3260f84bac6f5e99385212e9b3260f2a2bf21db672410643105d19ddb171971abc9ced1eef5d21d62780294b2310f31c81268aa3be9745fc5

  • SSDEEP

    192:Xq7mxGvzXEZlvTNBMkt3hmU8vQ4bS6o8G92914JG:X3IXEZxTjMkt4U8Vc9oCJG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aba75bff87a49ead0e3805e893d3293_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4aba75bff87a49ead0e3805e893d3293_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\Services.exe
      "C:\Users\Admin\AppData\Local\Temp\Services.exe"
      2⤵
      • Executes dropped EXE
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Services.exe

    Filesize

    6KB

    MD5

    0f471a3f6252b6b2d21b6959ae3b91eb

    SHA1

    b7a8c96bbc63890a2e3655b4c996e4010d889d33

    SHA256

    c9bb0503e744fc6ea7d39cf08e3151fd483f56904253197fa998166f303314f1

    SHA512

    a80e2d46a51fc3dc4c2553641393e996bf006485649be37b39e565e6b1f894b4fd67e0ef078da71ff2f5d4f9d18f90dd8105806920e056a55e54e446ea31cd83

  • memory/1996-0-0x0000000000400000-0x000000000040423C-memory.dmp

    Filesize

    16KB

  • memory/1996-13-0x0000000000400000-0x000000000040423C-memory.dmp

    Filesize

    16KB