Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 00:59

General

  • Target

    c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe

  • Size

    89KB

  • MD5

    c1f69001b97d666c01e4b4ba14cf1aa4

  • SHA1

    29e849c36ac63c51a3e5744371e5b11c49aaef5b

  • SHA256

    8d8374a15e6bf9e8bd01c0cd381957da7909ed4166806fc01aff28d7fde2ee4f

  • SHA512

    62f15276b20ed35102b75c53d2e4a904dda925a358890cb248f27fa60c1b3a4b1af20d864f0acbe2b3e7c01d7e5e2234d43b3a812fad5561e5719f7ae69a5bb9

  • SSDEEP

    1536:0E0vedP+zgwAhMn6ib02QZE2dC8WUKmgI9cRiV9KuzFXJNwAXV:h0KPVwxnotdDJoRGjNDl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c1f69001b97d666c01e4b4ba14cf1aa4_JaffaCakes118.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Users\Admin\AppData\Local\Temp\558340.exe
          C:\Users\Admin\AppData\Local\Temp\558340.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2160

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\558340.exe

      Filesize

      28KB

      MD5

      7443cb02e4b3e54c2914d3b94d223131

      SHA1

      d3f96eff5523a09becbac4d9e5debf619a28161f

      SHA256

      6ea54fd2ae0807d265058ab2520075813dd13d44c1be6a6259858241dcd76eb7

      SHA512

      0d77bbe581a47e64272300007c80ecd3c762339a3e3405606cedb60418bf0dc7d1ab625f5f2523188de2a9222f35292802abe7d9f76140ee1ba60486e74c6b56

    • memory/1192-13-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1192-19-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/1908-0-0x000007FEF5C4E000-0x000007FEF5C4F000-memory.dmp

      Filesize

      4KB

    • memory/1908-1-0x000007FEF5990000-0x000007FEF632D000-memory.dmp

      Filesize

      9.6MB

    • memory/1908-2-0x000007FEF5990000-0x000007FEF632D000-memory.dmp

      Filesize

      9.6MB

    • memory/1908-9-0x000007FEF5990000-0x000007FEF632D000-memory.dmp

      Filesize

      9.6MB

    • memory/1908-32-0x000007FEF5990000-0x000007FEF632D000-memory.dmp

      Filesize

      9.6MB

    • memory/2160-10-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2160-12-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/2160-31-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB