Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 04:57

General

  • Target

    5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    5f1ad873fd3231f61d716fe78edbb6a8

  • SHA1

    65508849502893ea63d35935e9500d3a39da243c

  • SHA256

    7d763fc9aaf9b2ff69d99e4368409cbc323e527c8ceb9ae0d9f886c9796acd4d

  • SHA512

    a160aee8297edfe6926122cc19805aae3ec3a80a042cbcf344a2632139914b53a9401d1e0fefac95af1db60211fdff805e2dc7d5e6c3ef2100608472f3fecafe

  • SSDEEP

    768:jHSh79vmucf28z1Z2txsfa+1aLEXmjEXYEPB9sDlnxN4r9:772oKxsJ1aLEMJpZnxNU9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f1ad873fd3231f61d716fe78edbb6a8_JaffaCakes118.exe" a
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 240
        3⤵
        • Program crash
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1364-2-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1364-3-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1364-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2324-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB