Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 23:00

General

  • Target

    03d2c7448c7fadf76e92549fe87cfb51_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    03d2c7448c7fadf76e92549fe87cfb51

  • SHA1

    41a97a2b3f07d2855825eb334e5ab5b3e7b2a226

  • SHA256

    4e7b5b4c5d512792e40674261bdb140c665ec1d2ad9c59ba62488105926d3e27

  • SHA512

    c5e241dffc86bc9f6a5567243a3b71efca36ae146f58a15c86505726b7f394167fc03b92e520e1832bc2f02edab06004f7c7fed082a39cc7d078cc5b4a7d6bba

  • SSDEEP

    24576:D9f06aiwrFnio0DQuJRSjlVJrztBSP7w69jF1+0uq0tW:xs6aiwJiBIlVbBn6BF1Wq0tW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d2c7448c7fadf76e92549fe87cfb51_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03d2c7448c7fadf76e92549fe87cfb51_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\starter.exe
      "C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\starter.exe" erAPE5064440doMIuCBL 934
      2⤵
      • Executes dropped EXE
      PID:2172
    • C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\ArcadeYum.exe
      "C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\ArcadeYum.exe" IC9UaWNrZXQ9ZXJBUEU1MDY0NDQwZG9NSXVDQkwgL0J1bmRsZXM9MTYzfDE0NXwxMzR8MTYyIC9PYmVyb249MSAvQnJvd3Nlcj0xIC9BZExvYz05MzQgL3RwZD1odHRwOi8vZDEuYXJjYWRleXVtLmNvbS9hai9idW5kbGUvOTM0Lz9wPVlUTXdPRE0wTVRBeU1qaDQzSGM4MXB0aHVTQnpUaFljJTJCVElNTW9GNVZrbWF6WlZzbUZDNDZCTEU4ZDA4b0ZSV2ZjNE5RZ0pZdEklMkJNSXM3SFdBVSUyRkJNOGRNSTAlMkZXUkp1RHo5SiAvb3B0aW1pemVHQz0wXDBMQkN1SU1vZDA0NDQ2MDVFUEFyZUxCIC91c2VyTmFtZT1BZG1pbiAvdXNlclNJRD1TLTEtNS0yMS0zNjI3NjE1ODI0LTQwNjE2MjcwMDMtMzAxOTU0Mzk2MS0xMDAwCg==
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b401df0761e68bfd8b200de600e90658

    SHA1

    050b8cc12f69fc1839ed2676262ecebb289019fc

    SHA256

    f2547e825d25e33beabbb5fc664730d822ab1a033a409a8aa944cb7913f662d8

    SHA512

    1b4747d3c3ccb5dd94a189a030fa84048a3d768295a55bac410da2f889026d62eace8b6dcf84a8b86e3efecb1b0e12bb0f32bf9896cc7e01681c984c94ed2993

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    2171cf47084b425d69704510e544248c

    SHA1

    cd388030ea93b13ff9407acaaabbefbb4ded4fd3

    SHA256

    80d8b6d61c6397daf41427a61ff1c8579946bf940a5eae1e197bfdef0f74a970

    SHA512

    aec6581eac295575b2661323a3c733f91f1eb3873442db653dbf62204ef6d3fed4acd3c1d17683a795ea3d421c1600abef447a4009f193437962fa02fb85a1bb

  • C:\Users\Admin\AppData\Local\Temp\Tar1ECC.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\ArcadeYum.exe

    Filesize

    884KB

    MD5

    dfda1c89e2b9945e717957c0799fa935

    SHA1

    1217d0759b8006f250a1ce7b921abf14ba93aa96

    SHA256

    cc8ca59dd4f2fe5027790fc92ec3c488956e4d2b2b161107f11fc9aef8053a18

    SHA512

    9939f2c757b0a183cd66abf81bd54d91e9042f44ad257402ff5f8f8f5a7dc41d6616a0a5c8842df1daf3b6396dccebe404e02d1c0e308690b05df49d23cdf5c1

  • C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\ArcadeYum.exe.config

    Filesize

    315B

    MD5

    acd39163e3bd0fa14d38bf71f7961fb9

    SHA1

    7466c306f923f35100997f9d46c5048f191e52a4

    SHA256

    a966ecb64a2935f44d4b506dd3bac8261c12e1e2b109d6b9197ef01980944f9a

    SHA512

    4f7cea360b7ee4e8c35534e9ae5f1d65cbdaa320fecbc9916bae566421de3237a899a3f288966f203832111b5e25ed817cc7a895b5c8e58199bad008749162ec

  • C:\Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\config.cfg

    Filesize

    74B

    MD5

    4106835ec22dfec932ee19c51d6ef854

    SHA1

    0b395ddef4f8273045d026cb16de7fcb4bdc9f8d

    SHA256

    6891fa8ae2e5cb96bb297a996e1c22db958bdc5c005a5f2035c3710a6cefaf60

    SHA512

    cf2f83652ba1a2d0db97a37e22759687b3f8150d0ffc0a6fcd1a329d4ea31d4f633834bda9278b46255374839b76f0a189ba2252cc9955fad49f219576bd58b7

  • \Users\Public\Documents\{8C1A49E6-2F7F-40E3-923F-5DE549CAF021}\starter.exe

    Filesize

    1009KB

    MD5

    5192e79a2f370aa3e8986a8a6573c97f

    SHA1

    25f0f0eb5889168c7f9da0befaaa7dbbdac5eda3

    SHA256

    427781fe5dc69aaae5b1afeef42a1455bb5244870eb21524da41ff65cdb9d55a

    SHA512

    e1d56d739a817c8889e78363896f3a50e8f781425af2e96998ff35c38b9bf540d146db1900405677e2269961ae7ede19a85cbf500b68d74eb1d81a26453f7f3f

  • memory/2856-24-0x00000000020F0000-0x0000000002130000-memory.dmp

    Filesize

    256KB

  • memory/2856-23-0x0000000074870000-0x0000000074F5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2856-22-0x0000000000B40000-0x0000000000C22000-memory.dmp

    Filesize

    904KB

  • memory/2856-126-0x0000000074870000-0x0000000074F5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2856-127-0x00000000020F0000-0x0000000002130000-memory.dmp

    Filesize

    256KB