Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 20:43

General

  • Target

    1c6f661deddbf56c7b470f0fe8233370_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    1c6f661deddbf56c7b470f0fe8233370

  • SHA1

    16060ae77e7d5b72df74649d5718daa75675eb45

  • SHA256

    b5dbfb12aa5a97e5014e64be64a2e9368ae8bb84f97643b4078f6fc9f3e82d1f

  • SHA512

    db6a93d748d73f39bc500b2f6fad2de95defed8a59fab435f2b88ad6e45a86742f88717db064880257b5a66adbdc61f84ec32d0f65076c77d0664c7535b0ac46

  • SSDEEP

    384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjK7aylryylFyyTsqljy8PQ:v+dAURFxna4QAPQlYg7aylryylFyyTsv

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c6f661deddbf56c7b470f0fe8233370_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1c6f661deddbf56c7b470f0fe8233370_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    13KB

    MD5

    68279bbc03bc197e47cdb783638ea146

    SHA1

    0bbbbe6ceda76888e485609be6d36d54dc01577a

    SHA256

    98966d4024e06d5e9aec264a57ba3ad4409b443105d8107eacfefe043ed75ed2

    SHA512

    d730f0c92f245102af82d259612d00662f823a1c84b5d016caec34ab569939c8fe1fcc8f716df622c87ba7fe419a511739629ab418497d1a5d348fe4dc89706f