Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 23:15

General

  • Target

    61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    61cf4714edf855a2c62b86aaa3236fab

  • SHA1

    76b327625e253a7b2728c7a3fee4478b6d718d61

  • SHA256

    e787c605f42483df51d1ea9ba298c3b987794182bffc9685715ad95b390b573a

  • SHA512

    a29fe116a3826ddc9cf5467434b9f26be8101d7b01c03f95c61c67255a97c7ecf44f51f2246b04d924bfac150c2779083ebd2106285fdd28827a420689571ca1

  • SSDEEP

    24576:wX/eO4qA611ZlZ38YrKkEROaL3v9Xjrh1TqM:7O4Zs1ZrbhEYUFXjFtF

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 49 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Roaming\hjpk.exe
        C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe -dwup
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Roaming\hjpk.exe
          C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe -dwup
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Roaming\hjpk.exe
            C:\Users\Admin\AppData\Roaming\hjpk.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2424
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2784
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1728
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:752
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2712
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2480
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1052
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2012
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1260
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2400
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1088
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2144
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2388
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2652
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:688
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:332
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2308
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:1620
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:3008
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2840
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1568
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:1680
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2564
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2620
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2580
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2544
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2548
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:3004
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2780
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2976
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2932
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2724
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1820
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:1796
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1640
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:884
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1224
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:676
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:408
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:2956
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1672
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:1544
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:536
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:1444
            • C:\Users\Admin\AppData\Roaming\hjpk.exe
              C:\Users\Admin\AppData\Roaming\hjpk.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1512
              • C:\Users\Admin\AppData\Roaming\hjpk.exe
                C:\Users\Admin\AppData\Roaming\hjpk.exe
                7⤵
                • Executes dropped EXE
                PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\hjpk.exe

    Filesize

    1.1MB

    MD5

    61cf4714edf855a2c62b86aaa3236fab

    SHA1

    76b327625e253a7b2728c7a3fee4478b6d718d61

    SHA256

    e787c605f42483df51d1ea9ba298c3b987794182bffc9685715ad95b390b573a

    SHA512

    a29fe116a3826ddc9cf5467434b9f26be8101d7b01c03f95c61c67255a97c7ecf44f51f2246b04d924bfac150c2779083ebd2106285fdd28827a420689571ca1

  • memory/1704-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-12-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-6-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-4-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-2-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-13-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1704-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2424-44-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2424-48-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2424-50-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2704-41-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2704-51-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2784-67-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB