Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 07:05

General

  • Target

    a19b5387ed1b8a3c818405f02feac41d_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    a19b5387ed1b8a3c818405f02feac41d

  • SHA1

    0bd853381d8fd80939024cdabf855623c034b678

  • SHA256

    e9d96a726fdc2e5684f02551849cdfc4202103548f48df65950aa871782280c6

  • SHA512

    8171511563985a6e34f47e713476fb17a65c3f0b75b6dcd266246508e8017823395d7257d7a06eaa868176af5c565ff03d2bc9b0a72ce6b22310ffaf2f623ddd

  • SSDEEP

    768:NGndX5hbH/5ziUHqffw4QL5sVmCvwXXqWA8AgjkKrB2tyFQEbr:Ncphbf5zBq24vK28Hjk2BiEbr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19b5387ed1b8a3c818405f02feac41d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a19b5387ed1b8a3c818405f02feac41d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yVUvd.exe.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yVUvd.exe.exe"
      2⤵
      • Executes dropped EXE
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yVUvd.exe.exe

          Filesize

          12KB

          MD5

          72bc2382cba6f480226ba4cc4aba9ab3

          SHA1

          c3fbd1cf7d93a5d30ccf2c728a0bbb453c6cd236

          SHA256

          3ea5e4088b2159326f52d36f08341887e6bb636664e5d8855016cb3bb4e0ccfb

          SHA512

          269974fcd802665e4a3505fe2bd2c48a0d9dfa8bbfd358be79d13877bbde85d2c62d19a521e4578da964dbd4460d762cbf756fb44f81036c1b58a66a6314384c

        • memory/2708-9-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2708-11-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2748-0-0x000007FEF64AE000-0x000007FEF64AF000-memory.dmp

          Filesize

          4KB

        • memory/2748-8-0x000007FEF61F0000-0x000007FEF6B8D000-memory.dmp

          Filesize

          9.6MB