Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 17:26

General

  • Target

    eb9b03a776a327680543a3c3085aa000_JaffaCakes118.exe

  • Size

    649KB

  • MD5

    eb9b03a776a327680543a3c3085aa000

  • SHA1

    13ded02f8a3ce0ed2a81c0c6dfb1adedbcde89e4

  • SHA256

    8decbff81fe33a0f2b9f037c87885bb6e5f1af2171a0a4471b2737b5c93aff1b

  • SHA512

    8b0c8afc09550e243ec159184c43f7d0e52cac0c40812466fa7982cb5c89052987ff480bd82b8385cc43d5a27d63ba748708fc4c0a8bbdf9073ad05f867204e8

  • SSDEEP

    12288:bN2EkJysKFyCYDkib34253mYCog78YZyYNPqIVtqacxI0yeIB:bNeJysKFmtb42EXog78CyMv3ncynn

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb9b03a776a327680543a3c3085aa000_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb9b03a776a327680543a3c3085aa000_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1724
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x0000000000A60000-0x0000000000B50000-memory.dmp

    Filesize

    960KB

  • memory/1736-2-0x0000000002900000-0x000000000293D000-memory.dmp

    Filesize

    244KB

  • memory/1736-1-0x0000000000A60000-0x0000000000B50000-memory.dmp

    Filesize

    960KB

  • memory/1736-4-0x0000000002900000-0x000000000293D000-memory.dmp

    Filesize

    244KB

  • memory/1736-3-0x0000000002960000-0x0000000002961000-memory.dmp

    Filesize

    4KB

  • memory/1736-5-0x00000000754D0000-0x00000000756E5000-memory.dmp

    Filesize

    2.1MB

  • memory/1736-6-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-7-0x0000000076330000-0x00000000768E3000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-8-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-9-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/1736-10-0x0000000076CE0000-0x0000000076F61000-memory.dmp

    Filesize

    2.5MB

  • memory/1736-12-0x0000000076B60000-0x0000000076C43000-memory.dmp

    Filesize

    908KB

  • memory/1736-11-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-13-0x00000000739C0000-0x0000000073A1B000-memory.dmp

    Filesize

    364KB

  • memory/1736-15-0x0000000073190000-0x00000000731AE000-memory.dmp

    Filesize

    120KB

  • memory/1736-19-0x0000000072DD0000-0x0000000072E5D000-memory.dmp

    Filesize

    564KB

  • memory/1736-23-0x0000000000A60000-0x0000000000B50000-memory.dmp

    Filesize

    960KB

  • memory/1736-24-0x00000000754D0000-0x00000000756E5000-memory.dmp

    Filesize

    2.1MB

  • memory/1736-26-0x0000000077320000-0x000000007739B000-memory.dmp

    Filesize

    492KB

  • memory/1736-27-0x0000000075900000-0x0000000075A20000-memory.dmp

    Filesize

    1.1MB

  • memory/1736-25-0x0000000075B10000-0x0000000075B34000-memory.dmp

    Filesize

    144KB

  • memory/1736-28-0x00000000768F0000-0x00000000769AF000-memory.dmp

    Filesize

    764KB

  • memory/1736-30-0x00000000773A0000-0x000000007745F000-memory.dmp

    Filesize

    764KB

  • memory/1736-31-0x0000000076330000-0x00000000768E3000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-32-0x00000000753A0000-0x000000007542D000-memory.dmp

    Filesize

    564KB

  • memory/1736-29-0x0000000075860000-0x00000000758D5000-memory.dmp

    Filesize

    468KB

  • memory/1736-33-0x0000000075340000-0x0000000075392000-memory.dmp

    Filesize

    328KB

  • memory/1736-34-0x0000000075280000-0x000000007530D000-memory.dmp

    Filesize

    564KB

  • memory/1736-35-0x0000000075A80000-0x0000000075AC5000-memory.dmp

    Filesize

    276KB

  • memory/1736-36-0x0000000075270000-0x000000007527F000-memory.dmp

    Filesize

    60KB

  • memory/1736-37-0x0000000075260000-0x0000000075268000-memory.dmp

    Filesize

    32KB

  • memory/1736-38-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-39-0x0000000076CE0000-0x0000000076F61000-memory.dmp

    Filesize

    2.5MB

  • memory/1736-45-0x0000000073170000-0x0000000073178000-memory.dmp

    Filesize

    32KB

  • memory/1736-44-0x0000000073180000-0x0000000073186000-memory.dmp

    Filesize

    24KB

  • memory/1736-43-0x0000000073190000-0x00000000731AE000-memory.dmp

    Filesize

    120KB

  • memory/1736-42-0x00000000739C0000-0x0000000073A1B000-memory.dmp

    Filesize

    364KB

  • memory/1736-41-0x0000000073A20000-0x0000000073A94000-memory.dmp

    Filesize

    464KB

  • memory/1736-47-0x0000000073140000-0x0000000073146000-memory.dmp

    Filesize

    24KB

  • memory/1736-46-0x0000000073150000-0x0000000073168000-memory.dmp

    Filesize

    96KB

  • memory/1736-48-0x0000000077280000-0x00000000772E3000-memory.dmp

    Filesize

    396KB

  • memory/1736-49-0x0000000075700000-0x00000000757FA000-memory.dmp

    Filesize

    1000KB

  • memory/1736-50-0x0000000072DD0000-0x0000000072E5D000-memory.dmp

    Filesize

    564KB

  • memory/1736-51-0x0000000072CE0000-0x0000000072DC3000-memory.dmp

    Filesize

    908KB

  • memory/1736-52-0x0000000072CB0000-0x0000000072CDB000-memory.dmp

    Filesize

    172KB

  • memory/1736-53-0x0000000072B60000-0x0000000072C28000-memory.dmp

    Filesize

    800KB

  • memory/1736-54-0x0000000072B20000-0x0000000072B52000-memory.dmp

    Filesize

    200KB

  • memory/1736-55-0x00000000769B0000-0x00000000769B6000-memory.dmp

    Filesize

    24KB

  • memory/1736-56-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/1736-63-0x0000000002900000-0x000000000293D000-memory.dmp

    Filesize

    244KB

  • memory/1736-64-0x0000000000A60000-0x0000000000B50000-memory.dmp

    Filesize

    960KB

  • memory/1736-65-0x00000000754D0000-0x00000000756E5000-memory.dmp

    Filesize

    2.1MB

  • memory/1736-66-0x0000000075B10000-0x0000000075B34000-memory.dmp

    Filesize

    144KB

  • memory/1736-79-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/1736-81-0x0000000076B60000-0x0000000076C43000-memory.dmp

    Filesize

    908KB