Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 20:05

General

  • Target

    JaffaCakes118_96f2ead05c2101f4102681b8a862579f.exe

  • Size

    248KB

  • MD5

    96f2ead05c2101f4102681b8a862579f

  • SHA1

    2222e996c4a5c4d45a08a8a94ed3ba2a43b8f4e4

  • SHA256

    726557246d1615103b842067b98583e645ee517feb2a072bbd2512866ace1ced

  • SHA512

    de97ab5ea9ae9d49fb75a41ae5f752bb962e16bae142ac19f85d4028c271edd650e97e4ca19d7b40c9f6a0ce2b94d6ba1e4709069dc7613b63b3c950546bef1c

  • SSDEEP

    3072:YGKROS5fkMLalsplF9YxKROS5fkMT9S+tERxm0D9:lKRlfdLQsZ8KRlfdDeD9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96f2ead05c2101f4102681b8a862579f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96f2ead05c2101f4102681b8a862579f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Root\Zehir.exe
      "C:\Root\Zehir.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Root\Zehir.exe

    Filesize

    50KB

    MD5

    d3a525c23941381963965b880c471eb0

    SHA1

    e55828db7644918980f8758e6cd8076a657273fe

    SHA256

    10232b739fa0ed45879f29edd52e448e7577520e85fb7d0bc2e125390b35bfdf

    SHA512

    a87b427a29cbfde0f08138d40c9ce560f1cbca8c13feb369da9ce7a90635a551ad0fba3394b1ad0733847a973ae9da3ad9d0389b2df2fab5dc39b9e76b2fd2e4

  • memory/664-0-0x000007FEF598E000-0x000007FEF598F000-memory.dmp

    Filesize

    4KB

  • memory/664-1-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/664-2-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/664-3-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/664-10-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-12-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-11-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-9-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-13-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-14-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-15-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

    Filesize

    9.6MB