Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 01:41

General

  • Target

    59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    59f3f897b00fe1b7bafc58a9d2bcf8ad

  • SHA1

    79970d311d3c9a5065a851794610284613ff9c51

  • SHA256

    e0a6ddcac1713fad1a48d1ad27e40412b07381534c019e88b1374a35d4f621a6

  • SHA512

    110f1d0f944502f25f1de1278b9579656845c20a220978e15c7d44e2c14418ac77df91a019a9a089b418d8cdd9487afb91c82e009807c615f7b481bded4f27c3

  • SSDEEP

    6144:4yBIuBlo8ACyd1dUhAE74jvaG66xegV+/mJC63W7P+tN1JB50Kb:4CcdjaUq6QgV+OvSPG175vb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\59f3f897b00fe1b7bafc58a9d2bcf8ad_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Users\Admin\AppData\Roaming\Sioma\xexy.exe
              "C:\Users\Admin\AppData\Roaming\Sioma\xexy.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:3008
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpeefa7e65.bat"
              3⤵
              • Deletes itself
              PID:2852
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:552

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpeefa7e65.bat

            Filesize

            271B

            MD5

            6c988f91975be7f8f58d5dbd1181966d

            SHA1

            0937f43a461f3d2e9daedfed32b3b05c6a4aecfa

            SHA256

            16182493093a548b654aac5731f16226b70f7edcdcb108ff7e02c520801c9801

            SHA512

            c073cf45bd21fffe65bb7637f58167057427aaae1faf037bb015caab482932ca9d8f660eb5475a2f615cd41d07713ca78d26747b00b9947907a08ad964a53f2d

          • \Users\Admin\AppData\Roaming\Sioma\xexy.exe

            Filesize

            312KB

            MD5

            a213f9bf689b46bc55c5c9584b856f4a

            SHA1

            b009643f670000d292ca6cd0cc311b48093fa103

            SHA256

            b6eeac882cea5e70eeae3acb99757a23829978f67a96c4c3b10d3c6b4c344e2d

            SHA512

            e46b20f4c9aebe734ba65f347932058aa10571022b90732f3496bd6a2f7f19b4f8139974b094a5ef95a97696e25d2f9917e1bf3e74a79fe012ad8b401303ee6a

          • memory/552-47-0x00000000022D0000-0x0000000002314000-memory.dmp

            Filesize

            272KB

          • memory/552-43-0x00000000022D0000-0x0000000002314000-memory.dmp

            Filesize

            272KB

          • memory/552-41-0x00000000022D0000-0x0000000002314000-memory.dmp

            Filesize

            272KB

          • memory/552-45-0x00000000022D0000-0x0000000002314000-memory.dmp

            Filesize

            272KB

          • memory/1108-22-0x00000000021D0000-0x0000000002214000-memory.dmp

            Filesize

            272KB

          • memory/1108-24-0x00000000021D0000-0x0000000002214000-memory.dmp

            Filesize

            272KB

          • memory/1108-16-0x00000000021D0000-0x0000000002214000-memory.dmp

            Filesize

            272KB

          • memory/1108-20-0x00000000021D0000-0x0000000002214000-memory.dmp

            Filesize

            272KB

          • memory/1108-18-0x00000000021D0000-0x0000000002214000-memory.dmp

            Filesize

            272KB

          • memory/1176-31-0x0000000001F90000-0x0000000001FD4000-memory.dmp

            Filesize

            272KB

          • memory/1176-28-0x0000000001F90000-0x0000000001FD4000-memory.dmp

            Filesize

            272KB

          • memory/1176-30-0x0000000001F90000-0x0000000001FD4000-memory.dmp

            Filesize

            272KB

          • memory/1176-27-0x0000000001F90000-0x0000000001FD4000-memory.dmp

            Filesize

            272KB

          • memory/1200-33-0x0000000002CE0000-0x0000000002D24000-memory.dmp

            Filesize

            272KB

          • memory/1200-35-0x0000000002CE0000-0x0000000002D24000-memory.dmp

            Filesize

            272KB

          • memory/1200-36-0x0000000002CE0000-0x0000000002D24000-memory.dmp

            Filesize

            272KB

          • memory/1200-37-0x0000000002CE0000-0x0000000002D24000-memory.dmp

            Filesize

            272KB

          • memory/3008-29-0x00000000004D0000-0x0000000000514000-memory.dmp

            Filesize

            272KB

          • memory/3008-34-0x0000000001C80000-0x0000000001CD3000-memory.dmp

            Filesize

            332KB

          • memory/3008-38-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3008-289-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3060-81-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-77-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-51-0x0000000002300000-0x0000000002344000-memory.dmp

            Filesize

            272KB

          • memory/3060-55-0x0000000002300000-0x0000000002344000-memory.dmp

            Filesize

            272KB

          • memory/3060-57-0x0000000002300000-0x0000000002344000-memory.dmp

            Filesize

            272KB

          • memory/3060-59-0x0000000002300000-0x0000000002344000-memory.dmp

            Filesize

            272KB

          • memory/3060-60-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-62-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-64-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-66-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-69-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-71-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-75-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-53-0x0000000002300000-0x0000000002344000-memory.dmp

            Filesize

            272KB

          • memory/3060-1-0x0000000000500000-0x0000000000553000-memory.dmp

            Filesize

            332KB

          • memory/3060-79-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-73-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-68-0x0000000077060000-0x0000000077061000-memory.dmp

            Filesize

            4KB

          • memory/3060-5-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3060-4-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3060-142-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/3060-166-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3060-165-0x0000000000500000-0x0000000000553000-memory.dmp

            Filesize

            332KB

          • memory/3060-2-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3060-0-0x00000000004B0000-0x00000000004F4000-memory.dmp

            Filesize

            272KB