Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 01:37

General

  • Target

    114c9eabfc7bfe30c57d1b7499e4f766_JaffaCakes118.jad

  • Size

    74KB

  • MD5

    114c9eabfc7bfe30c57d1b7499e4f766

  • SHA1

    9e6d07c2d035ddef0bbf7cd50e6bf863366eb2c1

  • SHA256

    aefdca14182c35b983fda54dd413b67ccc6e3ed466cbabd1969681389c8cf000

  • SHA512

    caf707d87ce9dfcdd7f6178b8b0268731b35cf61a49c8f3f584297b6ff95698ec55e1ea8708372cee6b4e4e8b1d34e61fc729e4b4a65cb256bfd82cd61f27bce

  • SSDEEP

    1536:MBWiNUugD0Lv7PXYWrm3xt19Z5C9HYQKKyR4i:MBvNUuvLzfYLht1c1O79

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\114c9eabfc7bfe30c57d1b7499e4f766_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\114c9eabfc7bfe30c57d1b7499e4f766_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\114c9eabfc7bfe30c57d1b7499e4f766_JaffaCakes118.jad"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2b28400c24412afd9d9b6d25533d549a

    SHA1

    a5b615b1f175b85abddeaf99f51413c93741dbaa

    SHA256

    eddbcc03ca80d2d1037a7ee7273985ac7a734d15640f65340c0dd09a23a0517f

    SHA512

    1f6f1503bf2843f51e6b1690f28ea1b17ac7eb8cae9695685a0fe3266a05470b5ab58874b77b82099f2988cfc16ea63188ae7f56810cd650f9309374ce74048e