Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/04/2024, 22:35

General

  • Target

    0638735a475f438a1892ffa89c9b5036_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    0638735a475f438a1892ffa89c9b5036

  • SHA1

    a6c31b0fa0465321a7822570058a00e12399dea8

  • SHA256

    2155864abce13b4faab12ed3936e08dca37649613ad811f9f175a671a087692e

  • SHA512

    8afd8ef921f4dce84ebec35652098fff91a1a7726ffa14fdc7b524703f8785371b12a4030db744fd5975a470e6edeaf2f52b6a7c7c5f33a99a17850da20ae904

  • SSDEEP

    1536:qt4PjXyB48PYmvwUFnToIfCCQNpy/Fael:qqPmtYmvwUtTBfCCQNpy/E2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0638735a475f438a1892ffa89c9b5036_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0638735a475f438a1892ffa89c9b5036_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\063873~1.EXE > nul
      2⤵
        PID:3364
    • C:\Windows\SysWOW64\qkolrq.exe
      C:\Windows\SysWOW64\qkolrq.exe
      1⤵
      • Executes dropped EXE
      PID:2476

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\qkolrq.exe

            Filesize

            65KB

            MD5

            0638735a475f438a1892ffa89c9b5036

            SHA1

            a6c31b0fa0465321a7822570058a00e12399dea8

            SHA256

            2155864abce13b4faab12ed3936e08dca37649613ad811f9f175a671a087692e

            SHA512

            8afd8ef921f4dce84ebec35652098fff91a1a7726ffa14fdc7b524703f8785371b12a4030db744fd5975a470e6edeaf2f52b6a7c7c5f33a99a17850da20ae904