Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 14:36

General

  • Target

    5c5bbc13a1cd7ecda8b25de292f200ef_JaffaCakes118.exe

  • Size

    641KB

  • MD5

    5c5bbc13a1cd7ecda8b25de292f200ef

  • SHA1

    fbf93496f5a98c8dae0f198c068c69b0d5361689

  • SHA256

    e1fecd48c15836dbb33e76bbdbb35d772bfcf1a6a1d17d0346c6fff399ef0929

  • SHA512

    62029693ea9bea7b4fb1c82aa41911e98d46bf51318272f57284bfe529790216e3a12aba2cbc3967642c1dd1faa86016d9b81d31e46c0bd9e25d9704978e6208

  • SSDEEP

    12288:EvfEgqzEZ2B4wou7mHAzFAPH43IS9x39vqlZttwxRrqHsbWVnp4XtO:pgq34wvmHAsH43pH3AtI7gnf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c5bbc13a1cd7ecda8b25de292f200ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c5bbc13a1cd7ecda8b25de292f200ef_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\~
      C:\Users\Admin\AppData\Local\Temp\~
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~

    Filesize

    448KB

    MD5

    13bf95806288cedf1128ed541bcf5d7e

    SHA1

    239d10f10202f58d04a79eb74148d933895684a7

    SHA256

    e5d499b1d1086560db3ee3f0bebcb81885fcaa2ebf12a278ab5dad2599ece76f

    SHA512

    b2faaee321272f1d5334d36a54305d2ce392409f0c990fe9343eaa955861699aec85b85deaa6b46bd3715bb435d345a7bd6eaac4c24268211c057e79a7177d92

  • memory/2136-6-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4120-0-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/4120-5-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB