Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 08:56

General

  • Target

    77957eae63e59086af827b03952894f2_JaffaCakes118.exe

  • Size

    104KB

  • MD5

    77957eae63e59086af827b03952894f2

  • SHA1

    3dcaf3436be2d998e07f00d0c62454cf294e1796

  • SHA256

    ce1e97c2533bf1bcfefaf4b3cdc61256349761e36e4737e1f8e6062e89c15dac

  • SHA512

    51a460a4e370f7438913e9272ebaa0d8d2a7d0fd3488e00bf99d0f0e95624e59f745121ff4eadca94a657026fd45b518f0e23bcbec7703ea9a20f3a60a7493b9

  • SSDEEP

    768:PSGhgNqcbvUVa8XdEgR4poPm3s0VStrWhLQzTGfmgcz3v4z7VP7LdGSu2HyTAzfu:lhKvMdXGoPm3d8KpQVg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77957eae63e59086af827b03952894f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\77957eae63e59086af827b03952894f2_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\system32\Important\svchost.exe
      "C:\Windows\system32\Important\svchost.exe"
      2⤵
      • Executes dropped EXE
      PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system32\Important\svchost.exe

    Filesize

    104KB

    MD5

    77957eae63e59086af827b03952894f2

    SHA1

    3dcaf3436be2d998e07f00d0c62454cf294e1796

    SHA256

    ce1e97c2533bf1bcfefaf4b3cdc61256349761e36e4737e1f8e6062e89c15dac

    SHA512

    51a460a4e370f7438913e9272ebaa0d8d2a7d0fd3488e00bf99d0f0e95624e59f745121ff4eadca94a657026fd45b518f0e23bcbec7703ea9a20f3a60a7493b9

  • memory/2292-0-0x000007FEF584E000-0x000007FEF584F000-memory.dmp

    Filesize

    4KB

  • memory/2292-6-0x000007FEF5590000-0x000007FEF5F2D000-memory.dmp

    Filesize

    9.6MB