Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 02:20

General

  • Target

    ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe

  • Size

    463KB

  • MD5

    ec7895ff1c76d9878eb83a1f5f293183

  • SHA1

    323cac16e31927d2dd60fcf44664a91f717ddb6b

  • SHA256

    ccabffdd4bf425868896cc1db74281920b722f7ba0107c767fdbe265d8fa90da

  • SHA512

    99a2bb3ad9cd27fb6ba4f11f30bca2dd7617f939f22ff82cfe93a7ed1e791a3108ec81c6eb1183f91882a2041c2b1b3e38530b96aa4a42af7d8bec4db07d71c3

  • SSDEEP

    12288:jilc87eqqV5e+wBV6O+pAsRdcHzDkEca/Y:jiSqqHeVBxhsRdecEf/Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:3188
    • C:\Users\Admin\AppData\Local\Temp\ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Roaming\EhStPING\backconf.exe
        "C:\Users\Admin\AppData\Roaming\EhStPING"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Users\Admin\AppData\Local\Temp\~77D.tmp
          3188 474632 3980 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4468
  • C:\Windows\SysWOW64\openpubw.exe
    C:\Windows\SysWOW64\openpubw.exe -s
    1⤵
    • Executes dropped EXE
    PID:1744
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~77D.tmp

      Filesize

      8KB

      MD5

      86dc243576cf5c7445451af37631eea9

      SHA1

      99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

      SHA256

      25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

      SHA512

      c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

    • C:\Users\Admin\AppData\Roaming\EhStPING\backconf.exe

      Filesize

      463KB

      MD5

      1ec39ef550da21181f0b94adaa3a6adb

      SHA1

      e45b2c6849bfb166f800d76b20049ff3a644c575

      SHA256

      11fe6b7156cfb33125d24e5920c60dc164322fdb99e5218f4a33d1abccfdb490

      SHA512

      1b25c9572790f93f5b1d7c7c787068165c26216137940eda7a2a806ca37fb1c47db52a78f119b4212de9e8427c850103c7e24ee4a559b7bd8ccd14ca7d958333

    • memory/1744-18-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1744-16-0x0000000000550000-0x00000000005CC000-memory.dmp

      Filesize

      496KB

    • memory/1804-1-0x00000000006F0000-0x000000000076C000-memory.dmp

      Filesize

      496KB

    • memory/1804-24-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1804-0-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3188-17-0x00000000088D0000-0x0000000008953000-memory.dmp

      Filesize

      524KB

    • memory/3188-19-0x00000000088D0000-0x0000000008953000-memory.dmp

      Filesize

      524KB

    • memory/3188-23-0x0000000003200000-0x000000000320D000-memory.dmp

      Filesize

      52KB

    • memory/3188-22-0x0000000001280000-0x0000000001286000-memory.dmp

      Filesize

      24KB

    • memory/3980-8-0x0000000000550000-0x00000000005CC000-memory.dmp

      Filesize

      496KB

    • memory/3980-26-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3980-6-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3980-10-0x0000000000780000-0x0000000000785000-memory.dmp

      Filesize

      20KB