Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/03/2025, 08:37

General

  • Target

    JaffaCakes118_7d88f94bbcfd7173415196313f5e591d.exe

  • Size

    877KB

  • MD5

    7d88f94bbcfd7173415196313f5e591d

  • SHA1

    38e7fe7f053c53a1f75c8cd8ec0be12d670e7e55

  • SHA256

    a7d2f55885f055dededcc8000d4e6871fb7d6107c92714f7368b5fdbd421ccd1

  • SHA512

    5ec038e41685e8b3c2c651a8f773ab872fd1ff7c9417120778f2e907d12760ee2267dc2c9b3d9051bedfb1b1bd42276ff023d5d193059603fc334a3257c31704

  • SSDEEP

    6144:lKRlfdLQsZ8KRlfdhKRlfdLQsZ8KRlfdhKRlfdLQsZ8KRlfdA6vW4Vs7elul2NG1:M1Le1Le1LXO4VszohVun

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d88f94bbcfd7173415196313f5e591d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d88f94bbcfd7173415196313f5e591d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Root\Zehir.exe
      "C:\Root\Zehir.exe"
      2⤵
      • Executes dropped EXE
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Root\Zehir.exe

    Filesize

    198KB

    MD5

    aa0932b7dbe352c4ef4a0dda417f6e39

    SHA1

    9e856279532a56c4d3e4fdc4b8edde338a518a93

    SHA256

    44796d85061d789fd58da843a3aa954a511b47127273a001c08668b96edb7b52

    SHA512

    3409b017357aef8c08f1e54b3ebce7b4eb2494139722267707ccabdb5a89a53e479307dd76056b1db7471631c3a57e40e93f0e17bb9656d34b164103cbe2f7ae

  • memory/2296-0-0x000007FEF603E000-0x000007FEF603F000-memory.dmp

    Filesize

    4KB

  • memory/2296-1-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-2-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-3-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-11-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2800-9-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2800-12-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2800-10-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB

  • memory/2800-13-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

    Filesize

    9.6MB