Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 16:39

General

  • Target

    63f432aec9772a884160d896882cbe0a_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    63f432aec9772a884160d896882cbe0a

  • SHA1

    22b37f7ee38f08666195e5851de117643d582fba

  • SHA256

    2f319c522bce7d3a7853bfb9c88574924ae15a0f68d58feac19d9bb9033b0ce1

  • SHA512

    025cc07d8f89b2c97c183845f331d36fc5d2ea8cc6680398281ceccb9e0aa31ef0909aebcfb63f6f6e5dbb5ad148926a295eb45d8cd6c0cd56173b460be89ce0

  • SSDEEP

    384:1o+PRpVf1vpCtuMihEM2P5Nt6tA6gbvqQj85A:15PRpV9YMMmEM2P5Nt6sRj8a

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63f432aec9772a884160d896882cbe0a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63f432aec9772a884160d896882cbe0a_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\E0FC.tmp.bat
      2⤵
      • Deletes itself
      PID:1732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\E0FC.tmp.bat

          Filesize

          207B

          MD5

          45177e0ca17880a867923bf0cb2618a6

          SHA1

          ace717390e33eb32bb2fec824ddd9d14485d7bca

          SHA256

          446b2ec13b541c29c58b3b9fe6d8640a5bf3f900f0bd3e124f90a533dde1f98f

          SHA512

          4e847b44eacac06387e951453f8a0487d259d6427ee87ba58f22addcc376f59210ff6eacd5ab979ba901f47501ef230281bbbbeff096a9de9a448dfaffca0f7c

        • C:\Windows\SysWOW64\xolehlpjh.tmp

          Filesize

          2.4MB

          MD5

          648d8bdf5c2086579c5299f5fcccea21

          SHA1

          1a3c3f223336be9b12791f25683b0b2e041e0fe5

          SHA256

          b1eb6564950e8677ba1dc5b59254f668cd7c65a884c49e5cb723338c3381770e

          SHA512

          0ea19424f323a02fb80cd1e0392b69243e71a47ec3b1bf49eb0e066e32b9593952ca92627a90409cd71b47cfc4693e432a8ccf625e8462bee7c2910a76530cf7

        • memory/2812-12-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB

        • memory/2812-21-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB