Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 00:20

General

  • Target

    4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    4c09761b8039307d3d23a9bd46a2b34e

  • SHA1

    8c587a20526b5c07d7f372ed7a7739ef25f7a0ad

  • SHA256

    9373b5f2a4af89b44e376d0a10efcce7cca7770b4a41959548b2d44f41e56145

  • SHA512

    2e85729aaede12129405fa7f4354022e462ad8cea215f259c0023d78b8bd1a33f1b7d44c2b97c45f4b4488951e240b33b6a98ff767d822dac0d4ce428ac97591

  • SSDEEP

    3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5d/U:SZRcx5VMpOKXur2Qf+5d

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\Bsejya.exe
      C:\Windows\Bsejya.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Twain001.Mtx

    Filesize

    2B

    MD5

    309fc7d3bc53bb63ac42e359260ac740

    SHA1

    2064f80f811db79a33c4e51c10221454e30c74ae

    SHA256

    ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa

    SHA512

    77dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8

  • C:\Windows\Bsejya.exe

    Filesize

    116KB

    MD5

    4c09761b8039307d3d23a9bd46a2b34e

    SHA1

    8c587a20526b5c07d7f372ed7a7739ef25f7a0ad

    SHA256

    9373b5f2a4af89b44e376d0a10efcce7cca7770b4a41959548b2d44f41e56145

    SHA512

    2e85729aaede12129405fa7f4354022e462ad8cea215f259c0023d78b8bd1a33f1b7d44c2b97c45f4b4488951e240b33b6a98ff767d822dac0d4ce428ac97591

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    23b8c3afc6b9cb352098c836132cfe8c

    SHA1

    6207ef29f603b06dc1c70ef1ab35e585988329b3

    SHA256

    3180ab3c10584867017b6ea64c0654ec9573255b37c06c3c496f87998e30e359

    SHA512

    8f80465932fa159c2b1d4d7f5069bd746efcfa731e7a50049fc42fb5fe9a5362b7e49ad198e85ee32977ba692ac8537483daf427901b060022eb5d285dc13ea7

  • memory/1596-46143-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1596-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1596-46144-0x0000000074BC0000-0x0000000074BCF000-memory.dmp

    Filesize

    60KB

  • memory/1596-21154-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1596-21161-0x0000000074BC0000-0x0000000074BCF000-memory.dmp

    Filesize

    60KB

  • memory/1596-1-0x0000000001BF0000-0x0000000001C13000-memory.dmp

    Filesize

    140KB

  • memory/2452-46140-0x0000000074BC0000-0x0000000074BCF000-memory.dmp

    Filesize

    60KB

  • memory/2452-46139-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-13-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-46145-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-46147-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-46150-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-46154-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-46162-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2452-46164-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB