Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 08:55

General

  • Target

    c2ab62358d4068151b331dfa4b3726ee_JaffaCakes118.jad

  • Size

    31KB

  • MD5

    c2ab62358d4068151b331dfa4b3726ee

  • SHA1

    0917cb9c727d90606a0f1fd731eff06c968f96d9

  • SHA256

    20720637dbb82f35eaf14468a25be032089e5a91b221f31c1b7b44d0db64a976

  • SHA512

    7a000504fd2444c01d0e6eef7a74f54af50fd57e3f77532b35171d5f37a6f60a9f9b4461f3323ab384e677014e37643424b18c91eebf30fc2fd79d027c5620b8

  • SSDEEP

    768:xAwPoQPYSOO9hImKG5P+CsfiWg7OQrKvJ6VV6Eb8XW:xAwwQfOO9hYGF+CsvgJWG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\c2ab62358d4068151b331dfa4b3726ee_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\c2ab62358d4068151b331dfa4b3726ee_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c2ab62358d4068151b331dfa4b3726ee_JaffaCakes118.jad"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fb00273f700827f1c66eb1e74a255635

    SHA1

    49ce9c5a037e1936df3eed4ba0da78f80b537a40

    SHA256

    e612599d74bf17162386980bd45c27a7685419233be2647c3c736ebb6c755a91

    SHA512

    5e19adac38e9baa52ebd7756f50e70df91350d28540de20f882da1fa1bfe495cee5a9dd976ff6f92faadee0dcfb496995be0b024c326724b5f30247b53284bba