Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 20:15

General

  • Target

    f43e5d9af312cbf4b6fe54c8493e0461_JaffaCakes118.exe

  • Size

    432KB

  • MD5

    f43e5d9af312cbf4b6fe54c8493e0461

  • SHA1

    a134b90b4a6ef9316679711ef273da410a7c8a19

  • SHA256

    454a93f9001bdcd5882032621ad317f4f02cfe010c09c25211bcaeb623b08847

  • SHA512

    0240c72ea13fa520eb4b030d7f977732707962607459c4677d187eea21a9fad506b8fd18a57ccdd2889b6393de73486c9336128e948fcea457c5ec5bbacc58e6

  • SSDEEP

    6144:OJRFTYCpsu2v3BeRUyqinBazIVDNPHRCHMi9KQsa7WOwofXbCQ:Wh8v8UknBasVDN5Cl9tJ73XX

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f43e5d9af312cbf4b6fe54c8493e0461_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f43e5d9af312cbf4b6fe54c8493e0461_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    PID:3492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    618KB

    MD5

    0bd9446dd805382b802cbf9bb345bceb

    SHA1

    090cc43c4b384b728e516207087972371b0ca651

    SHA256

    56412e8f43213d6d081e7e4f73986cc8a81e7b807a4d9acf48be767b28b6b3ff

    SHA512

    693289bf7a33c9091e0733dd33e16cba859c60b6c7697ae41208350d7d80309bcfab7e5978eb0bdcce6209cdffa28798ea490f0fd6b879abe19eea05a1e2b405

  • C:\Windows\SysWOW64\msiexec.ivr

    Filesize

    254KB

    MD5

    e42d7dbaf78740252d58bb068b079c59

    SHA1

    612da61a888105d819e67d17d43ed98d24db8f4a

    SHA256

    3d32bf28b98d00ca65c4ec019b565866bd6b0abfef343baad3db1bb479143c3e

    SHA512

    f724ae7a70c8d65dd35c2eac954a20e64ed044174f7450a5070b6bd42b7e09a575ae83832e130ff389949d0f60be86fb33834ec6587d82a66db43127b06403b6

  • memory/3492-0-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB