Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 14:33

General

  • Target

    13c01b3969cfed273c4dd969e1979d81_JaffaCakes118.jad

  • Size

    38KB

  • MD5

    13c01b3969cfed273c4dd969e1979d81

  • SHA1

    93208e64946c1ea1f0140898c42f966df341a49c

  • SHA256

    05769cd084cac09ebd3746b9e33110968d9e9a8f2693d21f46be24573389112f

  • SHA512

    80c2dbbd929b6ba9f352bc420a1e7add8049e0a4f76b81068a529acf6ff524fc576e3022d860b2ada53eb29be94e98179898825938ad0c1e308c7a1ec0e5b77e

  • SSDEEP

    768:9LStvpeBgTR7sUCNjGAP5ZTEURE357pC7fIHSMIHKaq:9/gTR7sUGjNPTE8l7wcHKaq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\13c01b3969cfed273c4dd969e1979d81_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\13c01b3969cfed273c4dd969e1979d81_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\13c01b3969cfed273c4dd969e1979d81_JaffaCakes118.jad"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1ff48c69372081cd4391bf89c7a9e0fd

    SHA1

    a14538e689a77dbd2a8afb01c20f145ab2a4db81

    SHA256

    c815d34ce2893b4999cfb71ee8f77a8e1406c897dae6656baf0c422f5ff54d13

    SHA512

    5968fa705559e2fa339a3cf98eb147d27b70a0d783553b6efabc594674358340ea3e57aa36dac978d00f3a802fae9297de157b7e9ef169a7e3c2ad5063d7bdbe