Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 13:50

General

  • Target

    072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe

  • Size

    399KB

  • MD5

    072f42c0a2815729c9411c4470b6d6f4

  • SHA1

    6cb4f79e6a5f2ddcddbbe8e11f02dd0749f331cd

  • SHA256

    6d02c6eafd84c920450d1b2e5a7e0fa456bed0c7135294c9813e6b756789d7f6

  • SHA512

    d2e5360b27408c4f6a108034f81a968abeec58ae5a6ea618c32492494e8204a657c483fd38519597ca6c13abb46277d470d38144415b4275cb671f9e7cb2deef

  • SSDEEP

    12288:a37nmvNn8ftQsi31qhoMqNkNOEv540hx:IzmvNetfyHnNsv5px

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Drops startup file
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1212
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1612
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1128
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    8465addd8d4ca9df6b3a5619c903393d

    SHA1

    09ce41379485d00b6cbb7a3d5f8a0f41ed618c7e

    SHA256

    3a137837d8712a726f1aa54787f397541b9468d91bfff05d6f732a9eff0549a2

    SHA512

    ac366e610797845ac562524cc9e73aff09d79591c3401b7d9e835c7655ec5109fb0d6669b6ad9ec5cf389b0e1a5f21dd9948857cc9bd84f00efc74f37391f44e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d8c96e61862aad74dfdc44993de331e9

    SHA1

    3ffe8ff8e51460e7e08769802e4596132d306d2a

    SHA256

    ac92dd17527c2e475276658754a6eafc88c89554767d20e6e413e18e51cea1d3

    SHA512

    eb5d06a714ba103d010c2387402cf1203a465c6c710f6a1f283d6f3433e3d35ae3139df95b9f7a1e9970264b8c377bf4c21ae13741975b2ec92d57037a763037

  • memory/1128-59-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1128-55-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1128-56-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1128-54-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1212-0-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1212-9-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/1612-40-0x0000000002990000-0x00000000029D0000-memory.dmp

    Filesize

    256KB

  • memory/1612-44-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1612-39-0x0000000002990000-0x00000000029D0000-memory.dmp

    Filesize

    256KB

  • memory/1612-38-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1612-37-0x0000000002990000-0x00000000029D0000-memory.dmp

    Filesize

    256KB

  • memory/1612-36-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1856-45-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1856-41-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1856-42-0x0000000002280000-0x00000000022C0000-memory.dmp

    Filesize

    256KB

  • memory/1856-43-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1956-76-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1956-73-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1956-72-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-74-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-75-0x00000000024B0000-0x00000000024F0000-memory.dmp

    Filesize

    256KB

  • memory/2020-80-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-79-0x00000000024B0000-0x00000000024F0000-memory.dmp

    Filesize

    256KB

  • memory/2020-78-0x00000000024B0000-0x00000000024F0000-memory.dmp

    Filesize

    256KB

  • memory/2020-77-0x00000000745B0000-0x0000000074B5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-5-0x0000000074680000-0x0000000074C2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-8-0x0000000074680000-0x0000000074C2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-4-0x0000000074680000-0x0000000074C2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2936-6-0x00000000024B0000-0x00000000024F0000-memory.dmp

    Filesize

    256KB

  • memory/2936-7-0x00000000024B0000-0x00000000024F0000-memory.dmp

    Filesize

    256KB

  • memory/2948-20-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2948-18-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2948-21-0x0000000074640000-0x0000000074BEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2948-19-0x0000000002800000-0x0000000002840000-memory.dmp

    Filesize

    256KB