Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 10:31

General

  • Target

    eadc93c8bcb14603579828f15ee5681d_JaffaCakes118.exe

  • Size

    430KB

  • MD5

    eadc93c8bcb14603579828f15ee5681d

  • SHA1

    db90e06751a4370ed4359bf0f6bd549791616cfe

  • SHA256

    16dca6620de2d8f15db120334c84ce14f699f9766edd64e466e89aacdee5a413

  • SHA512

    26d797690e1573cae7cc23df431a1de5f4f4bc7512d8c73ce1562798d9bb65a388b81f60f34bfe78df72005c5047387f8978a3dcc0b1f69ceafd12813e3d7062

  • SSDEEP

    12288:MY02c2Enae1TxDv7v8yVSyDtLOY9iKqOwYrhdi4KoS:MOEnae1dDv7fS0LOY9PO6di

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eadc93c8bcb14603579828f15ee5681d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eadc93c8bcb14603579828f15ee5681d_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240631375.bat
      2⤵
        PID:4876

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\240631375.bat

      Filesize

      261B

      MD5

      314061aac086d7d5f2c2aafa8e6b25e5

      SHA1

      67ae7e4a1e6a02cfa1bd0168a3899b1dec6cd185

      SHA256

      cbf564e32d38ce5b2181b1dd675c47b11073da2a56c469786c43da93c0858afb

      SHA512

      d4a0f0512fc85bb6ddb16ab25cf5cc90e7390838da5c4af3afec76f5bd9eb0a9d15da99f01a6d4dc3734bb2492b7d9c02450db6fc6c2957c3cc9e45b7fd7cf14

    • memory/2864-0-0x0000000000650000-0x00000000006CE000-memory.dmp

      Filesize

      504KB

    • memory/2864-3-0x0000000000650000-0x00000000006CE000-memory.dmp

      Filesize

      504KB