Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 21:38

General

  • Target

    42358f5c245d36c19dca4d5382d1d638_JaffaCakes118.jad

  • Size

    94KB

  • MD5

    42358f5c245d36c19dca4d5382d1d638

  • SHA1

    f77d053e543aae0f50383e1d043ad53ee50efff7

  • SHA256

    e9a8b7d5bc824f9f9a844b021f0cc625ffe3bfba217d62e01891d0c180444455

  • SHA512

    799d91edc8c84de39aa830f2280c84837cb913321fdba12b189c0505d9f6710abcf90d3a2f1323d56b83d90ed99d456f4da72ccd0972faaf18c7d7525b7d5254

  • SSDEEP

    1536:VUUlc+TNik2/a6AQpShYc3MmEPQDKtSMBY10ljCQrmPo7fC3vj46FWcyZA0BV/jj:VUUJhiSm/gWTtSMBJluQqPoDkb46FWcA

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\42358f5c245d36c19dca4d5382d1d638_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\42358f5c245d36c19dca4d5382d1d638_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\42358f5c245d36c19dca4d5382d1d638_JaffaCakes118.jad"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f490f3a3543088e19898614a408a637a

    SHA1

    feedf83fcd61d5096be66e44a715a2b519b49051

    SHA256

    fc4b1ddc5576e553f67addfbcd9b6aed59f96b8d17deb3c3dc68fdad6f3c7d11

    SHA512

    c8ec0010fa48435c7b7e73820a0ef1be2754b4a89d23374bd091b91c19b4af8aca1be4d58a830194be70e2817edd53ea0947bbac8efe24e077de173d8f044764