Analysis

  • max time kernel
    55s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 16:05

General

  • Target

    08107897078b4b3b394cf8cc4beea6cc_JaffaCakes118.exe

  • Size

    569KB

  • MD5

    08107897078b4b3b394cf8cc4beea6cc

  • SHA1

    7c1c035e0174a84026089fd9694034f580244e41

  • SHA256

    14e2a4fab3a316a8d48c4804bf9837abd6bf4e3ee26d1a0824ef015fb59206a6

  • SHA512

    7e4d0491afafb764af10745f30ba239bc1230428ce42d7d2ec05c87ed78bd8ba18f492aee63249dbfd18face01344d2e49983b2f55c017cd38be976190b52e92

  • SSDEEP

    6144:Le34hL7tjPZEMkCH7eR3DEaVC43qqQE5aNhGyCAqml0cfBASurPGnpOmEO9jtxod:jL7faCH7zaUU52fGR8lTOenpO29/o2AD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08107897078b4b3b394cf8cc4beea6cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08107897078b4b3b394cf8cc4beea6cc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\bbbcabfdicab.exe
      C:\Users\Admin\AppData\Local\Temp\bbbcabfdicab.exe 4-2-1-1-7-7-3-6-5-6-3 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714406742.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1928
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714406742.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714406742.txt bios get version
        3⤵
          PID:5072
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81714406742.txt bios get version
          3⤵
            PID:948
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81714406742.txt bios get version
            3⤵
              PID:1508
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 948
              3⤵
              • Program crash
              PID:4284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4368 -ip 4368
          1⤵
            PID:1788

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\81714406742.txt

                  Filesize

                  66B

                  MD5

                  9025468f85256136f923096b01375964

                  SHA1

                  7fcd174999661594fa5f88890ffb195e9858cc52

                  SHA256

                  d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                  SHA512

                  92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

                • C:\Users\Admin\AppData\Local\Temp\81714406742.txt

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • C:\Users\Admin\AppData\Local\Temp\81714406742.txt

                  Filesize

                  58B

                  MD5

                  f8e2f71e123c5a848f2a83d2a7aef11e

                  SHA1

                  5e7a9a2937fa4f06fdf3e33d7def7de431c159b4

                  SHA256

                  79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121

                  SHA512

                  8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

                • C:\Users\Admin\AppData\Local\Temp\bbbcabfdicab.exe

                  Filesize

                  826KB

                  MD5

                  61a7d6453449d1896addd3fdd54827ce

                  SHA1

                  74544cb9ecfade7828c70b3e2f95248e375745a2

                  SHA256

                  b603df6b7be048359cd5e0db02ab7d12c7cf485f11835df462c283c3a33827b9

                  SHA512

                  6448c43ef4f0c7d76c709a878ae392eba231efdb042f2e679f19ce4b1b709f977c112eb171eebe3716c5572f0abfd1c4fd00013369e13aea77b78b582f6fd154

                • C:\Users\Admin\AppData\Local\Temp\nsh3EFE.tmp\nsisunz.dll

                  Filesize

                  40KB

                  MD5

                  5f13dbc378792f23e598079fc1e4422b

                  SHA1

                  5813c05802f15930aa860b8363af2b58426c8adf

                  SHA256

                  6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                  SHA512

                  9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

                • C:\Users\Admin\AppData\Local\Temp\nsh3EFE.tmp\utu.dll

                  Filesize

                  108KB

                  MD5

                  c682db5dd38efe982e120b6c7d2951cd

                  SHA1

                  27fd523ea4e9c74e6009ed51273fb5d7fa890bac

                  SHA256

                  1ee9aa15ec183ec4a6dcca145c0e76fb9eb33f80b96bc63efe99750f1618ffc1

                  SHA512

                  cde5b3ac50e709cd26986ccf2829df92a01d30bb48de5c3a1bbcdffd2ff9c1b68787278a36c54ff95d42e909c954406391171b93c6ecdc6a739454bdd4f7ba61