Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 07:50

General

  • Target

    66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe

  • Size

    147KB

  • MD5

    66b99ffe1c60aad510b24c0a2e39d43e

  • SHA1

    27716d003ffc0f94043f6419091b5c87951b2b73

  • SHA256

    bef7ea4833e21db94ddeb0366cfb65be3b4a909e322239483b17abf789b54f5f

  • SHA512

    8910aaea784a9fc34c756b39ccd1f18874c8146d8167e377bfa1235d296fda9c0dca6e3bf24643f2a5ef89d801dbdea2b415ceb3f78a69d0c923fbdbe216d2c4

  • SSDEEP

    3072:2CMiqJl3v1S4AsvdhxBz8bNk/AKItB/pL/s9hlSLUFWzs:2CMzfM4vxBIO+XpDnUUzs

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\66b99ffe1c60aad510b24c0a2e39d43e_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    PID:220
  • C:\PROGRA~3\Mozilla\ksygpla.exe
    C:\PROGRA~3\Mozilla\ksygpla.exe -vwpcxle
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\ksygpla.exe

    Filesize

    147KB

    MD5

    376da184d52208250bc4efcdc460708f

    SHA1

    69c3482e915a7c33da75b9943cf6530dc7df44a8

    SHA256

    185d0ea827aab37a807a5b806b8f8d8d20f343c72b2c4adffd92891e80b47fd4

    SHA512

    ab01aa8844a91c7686477e34ac46e9773e059499e3e98b8c121a09014c0b053877ebeaaec266ad508de0635b58a79e738636a55043e117074bbf57d26aff337b

  • memory/220-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/220-1-0x0000000002180000-0x00000000021DB000-memory.dmp

    Filesize

    364KB

  • memory/220-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2152-11-0x00000000005D0000-0x000000000062B000-memory.dmp

    Filesize

    364KB

  • memory/2152-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB