Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 18:27

General

  • Target

    60f250e96de28980fbf6a1146faea97b_JaffaCakes118.exe

  • Size

    600KB

  • MD5

    60f250e96de28980fbf6a1146faea97b

  • SHA1

    57fd44850209c1a0d8633999fef096baacd3e325

  • SHA256

    6e5553436bda305e3545e0028963a4d08fcac69708bb6ffd42fd98f769463add

  • SHA512

    33472ea16d7168efb8f3cc76b11c7803d3beda8f6b44bb17854bcdcd8ef9c8fceec55ddabc067c75d8db1ede21a0224bbad8416a039df245b1b55d99e0ad919b

  • SSDEEP

    12288:R7K72wJqy2+pgRMRkmPabdQNED+YnsdFtxDkYYPy:5q2wIy2+pwMRHaSxYnsdWYp

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60f250e96de28980fbf6a1146faea97b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\60f250e96de28980fbf6a1146faea97b_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\60f250e96de28980fbf6a1146faea97b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\60f250e96de28980fbf6a1146faea97b_JaffaCakes118.exe"
      2⤵
        PID:2784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2784-28-0x0000000000401000-0x0000000000408000-memory.dmp

      Filesize

      28KB

    • memory/2784-11-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2784-22-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2784-25-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/2784-16-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2784-9-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2784-13-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2784-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2784-27-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2928-8-0x0000000003270000-0x0000000003333000-memory.dmp

      Filesize

      780KB

    • memory/2928-29-0x0000000000270000-0x00000000002C6000-memory.dmp

      Filesize

      344KB

    • memory/2928-26-0x0000000000400000-0x00000000004C3000-memory.dmp

      Filesize

      780KB

    • memory/2928-0-0x0000000000400000-0x00000000004C3000-memory.dmp

      Filesize

      780KB

    • memory/2928-7-0x0000000000270000-0x00000000002C6000-memory.dmp

      Filesize

      344KB

    • memory/2928-6-0x0000000000270000-0x00000000002C6000-memory.dmp

      Filesize

      344KB

    • memory/2928-1-0x0000000000270000-0x00000000002C6000-memory.dmp

      Filesize

      344KB