Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 14:02

General

  • Target

    6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe

  • Size

    918KB

  • MD5

    6374daa20a3c6eb253a2b14a76510c06

  • SHA1

    cc853d739f01b6a4658dd04e23136ab7b8a914b2

  • SHA256

    5b49d8d6a695162d5419ff7c4fb66b675cc3639898516237d7e84040790324bc

  • SHA512

    41f89aa74d27ca8a83de14bfe30c04bdd6e1b8954c5ce12fed107cf8facb8a24db2c6cb2ada00d15e2decc1edc69848ef9aa239ca2b70c9418ba1df25aa67128

  • SSDEEP

    24576:NE8NZMC425ttdFvG2TiLqPTCgJuGpwKkvefRqlcXduCZS7Tskji:NxjXdFu0CgJBpXkvefq2uwS7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\110949.bat" "
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118 /f
        3⤵
        • Modifies registry key
        PID:2888
      • C:\Users\Admin\AppData\Local\42126955.exe
        C:\Users\Admin\AppData\Local\42126955.exe -i
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\42126955.exe

    Filesize

    918KB

    MD5

    6374daa20a3c6eb253a2b14a76510c06

    SHA1

    cc853d739f01b6a4658dd04e23136ab7b8a914b2

    SHA256

    5b49d8d6a695162d5419ff7c4fb66b675cc3639898516237d7e84040790324bc

    SHA512

    41f89aa74d27ca8a83de14bfe30c04bdd6e1b8954c5ce12fed107cf8facb8a24db2c6cb2ada00d15e2decc1edc69848ef9aa239ca2b70c9418ba1df25aa67128

  • C:\Users\Admin\AppData\Local\Temp\110949.bat

    Filesize

    438B

    MD5

    b281c736a3aca05e0fb2d230aaa52382

    SHA1

    5bb9c0f106e9d7302fc6226e95feefe377ce833d

    SHA256

    20017afc9caa90cafa97a122e609c80a43861d76907b06a0bbb319e9459553c3

    SHA512

    e7dab762f001b37dab44bffd9f326af2d2e09f16252b834e8798ee39796e0f616288fb94f12718c80264fbf9ae3c2abfad11f129e2498482473964b650c8ad15

  • memory/2716-0-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-19-0x0000000001001000-0x000000000142E000-memory.dmp

    Filesize

    4.2MB

  • memory/2716-18-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-17-0x0000000003680000-0x0000000003BF2000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-7-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-5-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-4-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-3-0x0000000001001000-0x000000000142E000-memory.dmp

    Filesize

    4.2MB

  • memory/2716-2-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2716-1-0x00000000005E0000-0x0000000000A11000-memory.dmp

    Filesize

    4.2MB

  • memory/2904-30-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/2904-26-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-24-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-31-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-33-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-32-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-34-0x0000000003950000-0x0000000003EC2000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-35-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/2904-36-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-38-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-39-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-40-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-41-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-42-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-46-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB

  • memory/2904-48-0x0000000001000000-0x0000000001572000-memory.dmp

    Filesize

    5.4MB