Analysis

  • max time kernel
    132s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 22:50

General

  • Target

    5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    5e02ca5f957adb460f8b7e16e74444ec

  • SHA1

    c5cf20c8a1cbf63df031b31e4f7aef200737fc36

  • SHA256

    b75c649922b3bdf60fb93622dcdaad29c7cf7932d7cc4a044b75a1eef525bf1c

  • SHA512

    1e0b739fd0a8cec64c889694ba99d6d7bbec299198e901c27460b9497bb1c3981e0a8d20ebac62a7cd9f90bb95390b4a94262f5cfa776ba50adae1471c821b05

  • SSDEEP

    6144:5EBvZ4Y4hAsXBtsHTrYrq6WQnHtdez5/K:5EBvuY4hN8z5C

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2940
        • C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
          3⤵
          • Adds policy Run key to start application
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2092-31-0x0000000000350000-0x0000000000351000-memory.dmp

      Filesize

      4KB

    • memory/2092-144-0x0000000000400000-0x0000000000419C94-memory.dmp

      Filesize

      103KB

    • memory/2092-20-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2092-26-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/3008-9-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3008-6-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-4-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-12-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-15-0x0000000010410000-0x0000000010446000-memory.dmp

      Filesize

      216KB

    • memory/3008-2-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-13-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-14-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-19-0x0000000010450000-0x0000000010486000-memory.dmp

      Filesize

      216KB

    • memory/3008-11-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3008-243-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB