Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2024 23:20

General

  • Target

    e38762223f23dd3373ba4bff00f94c7a_JaffaCakes118.exe

  • Size

    515KB

  • MD5

    e38762223f23dd3373ba4bff00f94c7a

  • SHA1

    4689e1ce8b0377527b174c9b0e6f6b2d3f3771ab

  • SHA256

    4a6f525c5728145789924c96d5c8786dde14054a1d2a39db9c22fa8b30db0d6e

  • SHA512

    71cf734d2cdbcac81fd13e9dd84aeb59e90f92912687ed3020c08712ed5207da558f06e7891d49d921697cbfee29d8c3578fac08fdceacf454e4e6295c3baada

  • SSDEEP

    12288:YBIL6hD2x/HAWbR2zS4si0O1A83u2BSDoCqKcty:Yw6uHAW92zt/0Wu2BSMCqD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Obfuscated with Agile.Net obfuscator 5 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e38762223f23dd3373ba4bff00f94c7a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e38762223f23dd3373ba4bff00f94c7a_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp365C.tmp.cmd""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\system32\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:2688
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /f /sc MINUTE /mo 1 /tn "Microsoft Edge" /tr "'C:\Users\Admin\AppData\Roaming\Microsoft Edge\Microsoft Edge.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2552
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4CA6C644-6B99-49E0-805F-1F2CAC9E85DC} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Roaming\Microsoft Edge\Microsoft Edge.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft Edge\Microsoft Edge.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar42E1.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\tmp365C.tmp.cmd

    Filesize

    266B

    MD5

    8c5efe7440897f1eb21f99ed8fd08ef3

    SHA1

    755d8819f8f392f40de10fa6986af52f398b5e7f

    SHA256

    b54a919bf6d097b70237c807e1161face7fdac71c13436455fb7c92245c5a269

    SHA512

    05909b705923ac68f6296cd34c50602a65d5b219ca4198d1c039b06b2c8ff7ba754cbcc079830537b902c8a90b7371d381dd3dfa1101718154a5c002a731fafe

  • C:\Users\Admin\AppData\Roaming\Microsoft Edge\Microsoft Edge.exe

    Filesize

    515KB

    MD5

    e38762223f23dd3373ba4bff00f94c7a

    SHA1

    4689e1ce8b0377527b174c9b0e6f6b2d3f3771ab

    SHA256

    4a6f525c5728145789924c96d5c8786dde14054a1d2a39db9c22fa8b30db0d6e

    SHA512

    71cf734d2cdbcac81fd13e9dd84aeb59e90f92912687ed3020c08712ed5207da558f06e7891d49d921697cbfee29d8c3578fac08fdceacf454e4e6295c3baada

  • memory/2700-0-0x00000000002E0000-0x0000000000366000-memory.dmp

    Filesize

    536KB

  • memory/2700-1-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

    Filesize

    9.9MB

  • memory/2700-2-0x000000001B100000-0x000000001B180000-memory.dmp

    Filesize

    512KB

  • memory/2700-12-0x000000001B106000-0x000000001B16D000-memory.dmp

    Filesize

    412KB

  • memory/2700-13-0x000007FEF5780000-0x000007FEF616C000-memory.dmp

    Filesize

    9.9MB

  • memory/2772-28-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-34-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-21-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-22-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-23-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-24-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-25-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-26-0x000007FEF4D90000-0x000007FEF577C000-memory.dmp

    Filesize

    9.9MB

  • memory/2772-27-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-18-0x000007FEF4D90000-0x000007FEF577C000-memory.dmp

    Filesize

    9.9MB

  • memory/2772-29-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-30-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-31-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-32-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-33-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-20-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-35-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-36-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-37-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-38-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-39-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-40-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-41-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-42-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-43-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-44-0x000000001A770000-0x000000001A7E6000-memory.dmp

    Filesize

    472KB

  • memory/2772-45-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-46-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-19-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2772-17-0x0000000000280000-0x0000000000306000-memory.dmp

    Filesize

    536KB