Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 05:27

General

  • Target

    e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe

  • Size

    612KB

  • MD5

    e9530aac236ab40d5367665b55ac3bf9

  • SHA1

    ccd887876fcee56286d31701ecb7f247c4be561c

  • SHA256

    033884253a7a0d50221370381907ecaf9e2170da522a214b270ca5409d8f55e8

  • SHA512

    b83f1a2bc0f69c86a070b15ceb534cd8b7eaf9dfdf0e427607279458b40697b2ff651c567d5f7787649f04de8352fc199b567fa3956b4d74c3253fc0e75a9a8e

  • SSDEEP

    12288:fiWaUgkDhOPo0VdfG1mIn0sSelRnlUZrHQ:fiWDgkAJH6m0hl9lUtw

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 15 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\wauclt.exe
      "C:\Windows/system32\wauclt.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:4272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\TEMP:C980DA7D

    Filesize

    109B

    MD5

    a7ad3226b21f36879769b7c69d5d7913

    SHA1

    9ffe7c4ee73c760e0f48b1ce652c4eb789f3efb1

    SHA256

    ed28f01c882041a34740e4d1ca96086212b418a83211317e3f399295d0488e47

    SHA512

    bf92a954b9d84e931ea43f6059eeab80e0e7fcf8a867ffba1e0016c72d7b215a0cb8d0b23ec909ab25cd9993a98013a0b5dba9d9d2c4f9e6ed54f9b6acb24538

  • C:\Windows\SysWOW64\wauclt.exe

    Filesize

    612KB

    MD5

    e9530aac236ab40d5367665b55ac3bf9

    SHA1

    ccd887876fcee56286d31701ecb7f247c4be561c

    SHA256

    033884253a7a0d50221370381907ecaf9e2170da522a214b270ca5409d8f55e8

    SHA512

    b83f1a2bc0f69c86a070b15ceb534cd8b7eaf9dfdf0e427607279458b40697b2ff651c567d5f7787649f04de8352fc199b567fa3956b4d74c3253fc0e75a9a8e

  • memory/1888-2-0x00000000020A0000-0x0000000002129000-memory.dmp

    Filesize

    548KB

  • memory/1888-7-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/1888-8-0x00000000020A0000-0x0000000002129000-memory.dmp

    Filesize

    548KB

  • memory/1888-11-0x00000000020A0000-0x0000000002129000-memory.dmp

    Filesize

    548KB

  • memory/1888-12-0x00000000020A0000-0x0000000002129000-memory.dmp

    Filesize

    548KB

  • memory/1888-0-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/1888-28-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/1888-26-0x00000000020A0000-0x0000000002129000-memory.dmp

    Filesize

    548KB

  • memory/4272-30-0x0000000000620000-0x00000000006A9000-memory.dmp

    Filesize

    548KB

  • memory/4272-35-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-24-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-29-0x0000000000620000-0x00000000006A9000-memory.dmp

    Filesize

    548KB

  • memory/4272-17-0x0000000000620000-0x00000000006A9000-memory.dmp

    Filesize

    548KB

  • memory/4272-31-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-32-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-33-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-34-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-25-0x0000000000620000-0x00000000006A9000-memory.dmp

    Filesize

    548KB

  • memory/4272-36-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-37-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-38-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-39-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-40-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-41-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-42-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-43-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB

  • memory/4272-44-0x0000000000400000-0x000000000050D000-memory.dmp

    Filesize

    1.1MB