Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 16:17

General

  • Target

    5cb0d49f41c0af5c5b9c6e640152b861_JaffaCakes118.exe

  • Size

    687KB

  • MD5

    5cb0d49f41c0af5c5b9c6e640152b861

  • SHA1

    d4339fe8f6a5a213791452a86a5a0075b83badf9

  • SHA256

    827be3727e04e9d0497c45aded593161f742ac595b0942f2c4ca5d9aa75d41f0

  • SHA512

    28b10a574474d339e74b67cd4b8e4244cd5c66887a78f96ef503fb2f6e20fabf3d02a0b2266c1da73a56d532c825b4cbab9e675128a1d512244841c1ca05a83b

  • SSDEEP

    12288:LGcoX5b1E42zawgQZTS31YFxsP+8pOcGYkiJVwBpw/Hp:FaInzawbTLrsW8pOcGjiJVz

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cb0d49f41c0af5c5b9c6e640152b861_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5cb0d49f41c0af5c5b9c6e640152b861_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe"
      2⤵
      • Executes dropped EXE
      PID:2512

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe

          Filesize

          545KB

          MD5

          2dc2804d638284d2b2047ab5925f406c

          SHA1

          338b87ebd2b4d4591bf7af79ee0847ec9464a58c

          SHA256

          18290cee384467ca8422f618214711102a8cee75c81e1d30a4e6f56a68b0f222

          SHA512

          6508fff355c848f746e0dbe37ede4fd8af62008a89c95cac89e49c11150a88cd13a05aa16ff47ae5c3b6b00940d862a5fe1634fbab6a193d286fe22be5c1b0e1

        • memory/1812-20-0x0000000000400000-0x00000000004B1000-memory.dmp

          Filesize

          708KB

        • memory/2512-21-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2512-23-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-24-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-25-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2512-26-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-27-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-28-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-29-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-30-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-31-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-32-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-33-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-34-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-35-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-36-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB

        • memory/2512-37-0x0000000000400000-0x000000000048E000-memory.dmp

          Filesize

          568KB