Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 05:00

General

  • Target

    4ce43a7a13234c8a953ea53116a2639d_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    4ce43a7a13234c8a953ea53116a2639d

  • SHA1

    367f322dea25a6db0a20eee008a12f65229a87da

  • SHA256

    10ca531209444c616c512b25479cf2f70bdcaa37e13ccda2519c49baf07a40c8

  • SHA512

    f579cbfd86f03b5322caebaf0060ad8704f6fb48a37b3b98d401202ee77ede26ba85bdfa3862732d97887dcaa76524348262aba9868b7a216074fa803ae96e03

  • SSDEEP

    768:nTVd/b99jhEhVftVEPd/aBB8riAvjWBj5CEKR/tcmhKORaPuhEmO:Tbz9nEhVfTEpaBBVRA/tlhVDC

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 53 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ce43a7a13234c8a953ea53116a2639d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ce43a7a13234c8a953ea53116a2639d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\4ce43a7a13234c8a953ea53116a2639d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\4ce43a7a13234c8a953ea53116a2639d_JaffaCakes118.exe
      2⤵
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:2896

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.url

          Filesize

          150B

          MD5

          148c92a00abd25802c675276428ff65b

          SHA1

          12741785cb5e89893f1b336b507c57afc2760fc9

          SHA256

          a912e8a74de7f8a512352246d53f53f79e0a21f6a2db29fd73085d6b32aa8ec4

          SHA512

          9c0bceb52e330719ee3ac1a295ff4ee89cc31d068a230f486a19fb6f01c196c43001c09b5172fc6ab7a94aa2ba83c6364557a0ea12ecefed5ab9683af2f1b536

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ÌÔ±¦ÌØÂô.url

          Filesize

          142B

          MD5

          6e5ce573b139dbb50ae88f535db40dde

          SHA1

          10e3fd19ccb17f71b4b2c437fe43e0767fd827f3

          SHA256

          2711ebd3495907ad0767f3c175668bbc6da2b4e852aa2726b35790a29931ed63

          SHA512

          e26b4ed390b13cd5225f86864ac406048309a1157292d4905b0b150667e96ddc9cef55ae59fff3b75aa4841ab444b1e71485c7f53b944eb3c027e95441a7ab63

        • memory/2812-0-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2812-1-0x0000000000220000-0x0000000000222000-memory.dmp

          Filesize

          8KB

        • memory/2812-17-0x00000000002D0000-0x00000000002F6000-memory.dmp

          Filesize

          152KB

        • memory/2812-22-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2896-18-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2896-19-0x0000000000220000-0x0000000000222000-memory.dmp

          Filesize

          8KB

        • memory/2896-21-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB