Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 00:31

General

  • Target

    5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe

  • Size

    195KB

  • MD5

    5e5677f445e632845166c551434bdfbb

  • SHA1

    72913924c72f7c4e5fecd63a045f268d3ea31aae

  • SHA256

    4dbabfd2f7b0b29e9c53a9af04ac4e58d6545f1e504b1ccf3cc9251b1faff7c8

  • SHA512

    9090d0b767533d09f38eb9e0465d797dff5db88689b56017d849db49638ac9b3f5058791ebccfcac07e3340327d36a671238c440c1c3d4d07ded5f15b4bcba0a

  • SSDEEP

    6144:2zG8nriOnW/rGgGCY9DOwyYqY5P02iMK5:O1DYrDY9eYr02lK5

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\5e5677f445e632845166c551434bdfbb_JaffaCakes118.exe"
        2⤵
        • Drops startup file
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2200

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe

            Filesize

            50KB

            MD5

            3f5b738dfeb30e63c7e33e7bf30c89fc

            SHA1

            cc0627b4287e9ed01a0be29d525554759a55e154

            SHA256

            e809fb386ed9ef7e16f324df2050d1c78df7223524999ce67e75269bf4409637

            SHA512

            a667b01b0c4f04d4eee2556e620428ff318d6e15849d7d8117a9ef1fc50b8e31594efee7c484903071e5164b32e3f1ee8f2a4212245fecdd7caddb19c0cddb7a

          • memory/1196-29-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

            Filesize

            4KB

          • memory/1196-36-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

            Filesize

            24KB

          • memory/2016-18-0x0000000000520000-0x0000000000529000-memory.dmp

            Filesize

            36KB

          • memory/2016-25-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2200-26-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/2200-32-0x0000000010000000-0x0000000010011000-memory.dmp

            Filesize

            68KB