Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 21:13

General

  • Target

    5db0c95a72da9b20062a08e03b9f80a0_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    5db0c95a72da9b20062a08e03b9f80a0

  • SHA1

    f3997df101029f6e70d5b6fbd1f951ca7d4e322b

  • SHA256

    cb829bca8da7e0158ed785d62cb877b654737ffaec22dfd7262b2271d1d59a0d

  • SHA512

    b3460effc8da3dfbcd507c0bc95fe3abdb2cdc0beae6ca079f4f7b1b19ce4e6b6565ae7d98ffa15dbaba265645fa058b06a97234544429297671dd50e2c6bd75

  • SSDEEP

    1536:olfYR5Y/RG3JT5L2dwvmdrBGofxmpMTui+9MXELP8bRrytGj7tVhkseRaCOMd5nH:n5wGZF8COMn

Score
7/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 44 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5db0c95a72da9b20062a08e03b9f80a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5db0c95a72da9b20062a08e03b9f80a0_JaffaCakes118.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe advpack.dll,DelNodeRunDLL32 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
      2⤵
        PID:1032
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
          3⤵
          • Modifies registry class
          • Runs .reg file with regedit
          PID:3020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\TempIE.reg

      Filesize

      2KB

      MD5

      bf050ae6f7573dbb0823dff030851dee

      SHA1

      46de6ffd8e85c6edce14aa9a730ca776cf1fad46

      SHA256

      9d483d5aa98bf9dc97306442769f4703f07e7ea3fce24fedd169e3b15d7385b2

      SHA512

      b708ec524211d7787e4540f2f7c6103720c2f523e26ea4c854558edc734e59bc6a4e14e350b4ebf1af7a75718fe85a7d28e765405f629c9304ef67fa3b246846

    • C:\Users\Admin\Desktop\Internat Explorer.dll

      Filesize

      91B

      MD5

      e83b9607cc6e5ed1f21cb66678ae52e0

      SHA1

      9f148380b2e8beb6035264f14a298691526d0dd2

      SHA256

      c01e56faf0a6cba82539f234eeae7a7b6553bdc2bcf942214eaad19357e5e1e4

      SHA512

      ee094d651a7eb902ad456d3644978667441a5693a81e6a11dd574eac37fbf018546d33d91e73ac3bdababbd66af0c6ae69675525448fa142366da99d14466c8c

    • memory/1864-0-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1864-13-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB