Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 10:54

General

  • Target

    eae6d5e0e55e97d65c74181f15cf6344_JaffaCakes118.exe

  • Size

    41KB

  • MD5

    eae6d5e0e55e97d65c74181f15cf6344

  • SHA1

    9514b822128c3b4f929f49caecfe4dec5c21696c

  • SHA256

    cb34ca3e628a7120fd5893fbb674c4d3a8e99c4bba871a03518da0a489474138

  • SHA512

    b76e2be3250e431bd63c9dc598446d6c6ffee260bb24f7cfbd008dcf0360b719854ef1100374f4f15462f194d6a192cca04c7228172cec6794b58d4c0e741cba

  • SSDEEP

    768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rCBsPGTWikRyyyxOJyyyQ:GY9jw/dUT62rGdiUOWWrC6P6Tq

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eae6d5e0e55e97d65c74181f15cf6344_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eae6d5e0e55e97d65c74181f15cf6344_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2724

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    41KB

    MD5

    7ba2571bce28672f404985cce8110ffa

    SHA1

    43c572bd9115719cad46056c53cbddf453bc76fd

    SHA256

    94cf85648c269f7ce46fa853b88aae510472105ddfc89b8d97279a3a97347915

    SHA512

    0fd69244579657f81942484e968671a6eaf5d84c494e811aac1865d9e43dfe7470e8bfc9ccaab5f3d1c95176557382e21eb2ce5423ed79be8b62ee6556ab38b5

  • memory/2292-1-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2292-10-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB