Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • submitted
    28/03/2024, 07:26

General

  • Target

    006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    006c50e0d2c17bdcf357c18c33c16bd4

  • SHA1

    30c7fd7f2ed979b81df64c5130a7aaab0514197f

  • SHA256

    fa3d137dbf86138f13a9a51fdf586222f72d2201962a6aa9c5890aa3c2c097a3

  • SHA512

    fa59cf0b02c60cf0542ea2fdea3bf275237179998625312425c44f3543783acf1cfb8da51624c0998dc4bf0c1e85335561c1507ba1e0037e83f57c4e9ce6479f

  • SSDEEP

    24576:NAHnh+eWsN3skA4RV1Hom2KXMmHa2XOS+/ODFJ2ifnTBMJ52cDT0F5:sh+ZkldoPK8Ya2X2WzlMJIcna

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden ( Copy-Item -Path "C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe" -Destination "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\'Start Menu'\Programs\Startup\111.exe" )
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops startup file
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3656
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
        PID:4116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 80
          3⤵
          • Program crash
          PID:3148
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 640
          3⤵
          • Program crash
          PID:1192
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
          PID:3528
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 80
            3⤵
            • Program crash
            PID:3416
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
          2⤵
            PID:2612
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 80
              3⤵
              • Program crash
              PID:4328
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4712
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 652
              3⤵
              • Program crash
              PID:4644
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4568
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 640
              3⤵
              • Program crash
              PID:4576
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4116 -ip 4116
          1⤵
            PID:4856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3528 -ip 3528
            1⤵
              PID:1836
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2612 -ip 2612
              1⤵
                PID:1244
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4676 -ip 4676
                1⤵
                  PID:1764
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4712 -ip 4712
                  1⤵
                    PID:1948
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4568 -ip 4568
                    1⤵
                      PID:2720
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2712 --field-trial-handle=2264,i,1475924722205134884,16549311107360026087,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:3576

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wewpxlph.344.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • memory/3656-45-0x0000000005560000-0x0000000005570000-memory.dmp

                        Filesize

                        64KB

                      • memory/3656-9-0x0000000005560000-0x0000000005570000-memory.dmp

                        Filesize

                        64KB

                      • memory/3656-10-0x0000000005560000-0x0000000005570000-memory.dmp

                        Filesize

                        64KB

                      • memory/3656-11-0x0000000005BA0000-0x00000000061C8000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/3656-12-0x0000000005A30000-0x0000000005A52000-memory.dmp

                        Filesize

                        136KB

                      • memory/3656-13-0x0000000006240000-0x00000000062A6000-memory.dmp

                        Filesize

                        408KB

                      • memory/3656-14-0x00000000063A0000-0x0000000006406000-memory.dmp

                        Filesize

                        408KB

                      • memory/3656-8-0x0000000074500000-0x0000000074CB0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3656-53-0x0000000074500000-0x0000000074CB0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3656-24-0x0000000006410000-0x0000000006764000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/3656-35-0x0000000006A00000-0x0000000006A1E000-memory.dmp

                        Filesize

                        120KB

                      • memory/3656-49-0x0000000008080000-0x0000000008624000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/3656-48-0x0000000006F30000-0x0000000006F52000-memory.dmp

                        Filesize

                        136KB

                      • memory/3656-37-0x0000000006A50000-0x0000000006A9C000-memory.dmp

                        Filesize

                        304KB

                      • memory/3656-7-0x0000000003370000-0x00000000033A6000-memory.dmp

                        Filesize

                        216KB

                      • memory/3656-46-0x0000000007A30000-0x0000000007AC6000-memory.dmp

                        Filesize

                        600KB

                      • memory/3656-47-0x0000000006EE0000-0x0000000006EFA000-memory.dmp

                        Filesize

                        104KB

                      • memory/4676-29-0x0000000000400000-0x00000000004C9000-memory.dmp

                        Filesize

                        804KB

                      • memory/4676-32-0x0000000000400000-0x00000000004C9000-memory.dmp

                        Filesize

                        804KB

                      • memory/4676-26-0x0000000000400000-0x00000000004C9000-memory.dmp

                        Filesize

                        804KB