Analysis

  • max time kernel
    138s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 22:52

General

  • Target

    651e0b599cbbbbaa4b42f2d724d91af5_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    651e0b599cbbbbaa4b42f2d724d91af5

  • SHA1

    1358d08293184f8c7b8d4e8482aca61fdf49b163

  • SHA256

    56b79bf2d7c5c49b62a99ad73ace1153b649a9af4bb7546452ab6bfcdaf92cc3

  • SHA512

    96ce0f3f9dc12fe27c520c49bee82078be207505b24dbeb5543d72c9b4e95e51e101ffdcf68bbe6bc3feb51ee1f6d6eab9e1ef43ee6e84886a39db41b2891ca3

  • SSDEEP

    768:/tMeNgx+xXC7LaJfT7TzpBcK3BtpmBF3A+qz7ynGItN+o+m9K:/yg1RCaJr/9BcK3BtMBFnnGIT+o+2K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\651e0b599cbbbbaa4b42f2d724d91af5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\651e0b599cbbbbaa4b42f2d724d91af5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\reg.exe
      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f
      2⤵
        PID:4332
      • C:\Users\Admin\AppData\Local\Temp\servicesc.exe
        C:\Users\Admin\AppData\Local\Temp\servicesc.exe 651e0b599cbbbbaa4b42f2d724d91af5_JaffaCakes118.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 520
          3⤵
          • Program crash
          PID:4072
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4064 -ip 4064
      1⤵
        PID:4932

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

        Filesize

        32KB

        MD5

        deb88e62e4db826bffe7415c754e0e76

        SHA1

        1d89bd72ba3b522d7a235992adafcfbc8513a503

        SHA256

        0de1c8d6fcc6bd0def3a01d36b5c1e8a8e8c496b29eb04598a306085ebb692ad

        SHA512

        0f6b566f960d98ef638057a1400c389c82752d687cb170d2d12b197a47b18fe00e1dc83e7147699e0a73e29b188a32c8b588b6602dece992924721894a3400e6