Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 04:37

General

  • Target

    5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe

  • Size

    359KB

  • MD5

    5a7d4bfe0be25700d3a400883cdecdc0

  • SHA1

    7c3737c823c91fe38049bc0f3a819bb338bd0d59

  • SHA256

    216793e42e0490fb94d7a8b6156f6f85ba810a8f0600777d49c9a819a32aef28

  • SHA512

    de20d3f3f386c56b45b5c6792c46df54a816390be115c6d88f2f0763ef47c202cfd0326bb248ecef7a0286d660720c1efdd2447fe20946397e3be7b151f3f1cf

  • SSDEEP

    6144:ZgRyiIWQFpUv4/B+FrM144XlzKlUAzYYbuewX79GtPuB8PxwPh79i5s/CoS9iP6z:3iMCv45+uK4VKXknewr9GBY85wPTi5sa

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.data

    Filesize

    794B

    MD5

    2e23a82d148b95d2c672136b77f8f1ca

    SHA1

    42ccf6a3ff48dbaf5b8aa5c87fcc4062fd1d3037

    SHA256

    b222d55a107fef8accad8656b1cdd6228135945a6bf2ee9627fff9c55a6e13eb

    SHA512

    f75d3bd0f053ca3b2a2b25c2bc77381b2be7b1dee8603236fa1333df36cb7446b04e7b42aa8e6c95a652a7fae2718c9119004cf623d446bbd9921d2363d56761

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.htm

    Filesize

    635B

    MD5

    33f09577707d079a40f706a18e126d92

    SHA1

    0cef1f55b72a84e584a51e79a6787ea78d74a603

    SHA256

    e7f6bd122fcb829793f4047a5b929668b0a91ebfe31247b479586ec6d8f2b378

    SHA512

    5538c5b4e538a97796bfc412b3a81449931a9bbc1fa4e69500a0b30b35c1259bda857f392d85d87893999098bc88a432f28d2f699fadc295709a75b8113933cb

  • memory/3020-38-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-27-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-32-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-33-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-0-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-44-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-45-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-52-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-53-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-54-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-59-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/3020-65-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB