Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 01:41

General

  • Target

    02208aacaa8b3f326c33a5d253623231_JaffaCakes118.exe

  • Size

    7.5MB

  • MD5

    02208aacaa8b3f326c33a5d253623231

  • SHA1

    944e52dae4cbf1cebeef3aa38f2f90e39c73fbe0

  • SHA256

    91ef31d037b80b55870fb39766ef05402bee03c5b1a537ba7b69c8b89bc2c69d

  • SHA512

    d0bf4ea1d556bffa86b523e2347685c7cdb42cbb3fa3f1e70e6564b74092419b7246799f34c6e726d886e672b9a51b067d65fd30b8a6684fc152fcd62c7d4554

  • SSDEEP

    98304:JJgurws99txVvpUsZyBSTr7AKo8CXE1eVTqVmLWR2TmZQ3y9e7g1AMrVhlpZ+mRg:vgPI5prVo8CU1PcuNQi9eg1AM3ubb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02208aacaa8b3f326c33a5d253623231_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\02208aacaa8b3f326c33a5d253623231_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Windows\SysWOW64\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im KuaiZip.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1748
    • C:\Windows\SysWOW64\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im Update.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2028
    • C:\Windows\SysWOW64\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im KZReport.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2800
    • C:\Windows\SysWOW64\taskkill.exe
      "C:\Windows\System32\taskkill.exe" /f /im UpdateChecker.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads