Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 18:23

General

  • Target

    0cceede0437d194e0573424a8227bdf7_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    0cceede0437d194e0573424a8227bdf7

  • SHA1

    0ebe8c91991c8a37c668a9d154799ce385abb6e6

  • SHA256

    684f03646bd8de7eb2f3d9a554319751dea91723936cfcc0c150276fa2819790

  • SHA512

    d76184f781a2ec0c91731870a16f27f023b758244e3459868308ad86636044214262396ae7d3a491141423135e358aec61797ab4046d0cbe2ae5ef2f3587de6f

  • SSDEEP

    49152:6mO46HAzYJwP62wHSJxOsRvXEqRiKP99EkeikCE1tlB7UI4:6myAzY32wHSXOrq8AXTItlB7Uv

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cceede0437d194e0573424a8227bdf7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0cceede0437d194e0573424a8227bdf7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Camtech\MP3 Tagger\install\MP3Tags.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\0cceede0437d194e0573424a8227bdf7_JaffaCakes118.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2656
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MP3Tags.ini

    Filesize

    78B

    MD5

    a0065dca72f7c4c4c7118532d383d537

    SHA1

    7ffa6bef9f3cfbed42323a065b325c0e2aa374d6

    SHA256

    2f01991a97a09efd0dd707106cf436c23677a961551078195718bce5fbf5d08c

    SHA512

    d4e451455b25a2b5118c85695a4066804c8b07b249be98d87b9b56d3975644db24a0cde14deacbaf4ca9cce49d10058ba5b550a347ace29e077ffe1af05697d7

  • C:\Users\Admin\AppData\Roaming\Camtech\MP3 Tagger\install\MP3Tags.msi

    Filesize

    138KB

    MD5

    4c8adec6c2dcb3425db979183076c1ed

    SHA1

    069da7a3bf535e3973c6aba75820606432549e42

    SHA256

    6b2ce5c30b777562da49d0ea9804f0585b327c7166532a00f4a1f4e2892e05e8

    SHA512

    ba9e6e3ce46956e2457ee63b725adf74d88010c23da519a305442a40d246944eba6f3a83c3f58594ba4be59e013b46138a4fd7b829061ae183a9c72ddad5f724