Analysis

  • max time kernel
    125s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 19:37

General

  • Target

    f42f5885b6004a001430dcdb89b19397_JaffaCakes118.exe

  • Size

    18KB

  • MD5

    f42f5885b6004a001430dcdb89b19397

  • SHA1

    aa5ded2a03ec430d08ed8fd7074279265d2cdf39

  • SHA256

    a0c2d66fe0c0c551fe1b12bd27ea9b495c37bc9744bcc696a7e9ba7633c93805

  • SHA512

    5b44cab23848a06c128cb5d04385867d5dee4960c8bebd76275682f55af5d60d57b0f7cffeea4d02923e698c9b6275faec8636b60dfb35e07051b8cc08ee1175

  • SSDEEP

    384:gtmL+/ikPwqyhYNjYxWd8Kf3O82koiglZipCtp:gtmNhqnYxW+KPO82bI

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3412
      • C:\Users\Admin\AppData\Local\Temp\f42f5885b6004a001430dcdb89b19397_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f42f5885b6004a001430dcdb89b19397_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 860
          3⤵
          • Program crash
          PID:4060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 484
          3⤵
          • Program crash
          PID:2916
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4124,i,7447082786332118630,10839110169592584063,262144 --variations-seed-version --mojo-platform-channel-handle=4508 /prefetch:8
      1⤵
        PID:4500
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2508 -ip 2508
        1⤵
          PID:376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2508 -ip 2508
          1⤵
            PID:2828

          Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\~!#8DD8.tmp

                  Filesize

                  3B

                  MD5

                  ad4102106375d09dd138adfcf3b6c882

                  SHA1

                  474c638758ba37e1900f19bb32de897b016f47b4

                  SHA256

                  a90ea0a5d549c3ea3fcd7459ccc812aabf5bf5dfe7604eff9131328afe26eeba

                  SHA512

                  889584c0c9c509c69c33107d62e59e165838aaf3c03e5f384e7f9ecc3ee398e14e5483e2bb186bd85703a8bd6e5d2f4e50693d50418ff3667977d6d271ce9738

                • memory/2508-0-0x0000000000470000-0x0000000000472000-memory.dmp

                  Filesize

                  8KB

                • memory/2508-147-0x0000000000470000-0x0000000000472000-memory.dmp

                  Filesize

                  8KB