Analysis

  • max time kernel
    138s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 02:06

General

  • Target

    0d2ec804fc3b2efadaf1f3d3a967b062_JaffaCakes118.exe

  • Size

    212KB

  • MD5

    0d2ec804fc3b2efadaf1f3d3a967b062

  • SHA1

    9bc255a094d6b96fd7ebeecad28b5c10290b4ae7

  • SHA256

    95eb1319742ea4bd2d3ea5477a65f4e0630e9fcd16ac6775c249dcd8d28ce8b7

  • SHA512

    744b14b8dab0b2cad7100bcafe19c8d580818b841648c1e91bd83c13a789279021fa42abc3a8de019ce9f74fbfe07aaafb151ac19b78f6c4446db62d26dd9f40

  • SSDEEP

    6144:We34y2pbTh+3pwLpAKKi8A//t4V1TLAo/o5b77ClFx3:kvh+3KaltAnIhLB/m43

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d2ec804fc3b2efadaf1f3d3a967b062_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d2ec804fc3b2efadaf1f3d3a967b062_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Users\Admin\AppData\Local\Temp\nsf3A6A.tmp\dlmgn.exe
      C:\Users\Admin\AppData\Local\Temp\nsf3A6A.tmp\dlmgn.exe "C:\Users\Admin\AppData\Local\Temp\0d2ec804fc3b2efadaf1f3d3a967b062_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsf3A6A.tmp\dlmgn.exe

    Filesize

    369KB

    MD5

    3c8fcdd5824e8194f999e9ca50c3c751

    SHA1

    89ffa620df2c41641dcb4af815c0e381dcd2a4da

    SHA256

    9c362ee61694e130bd904bfcf7c32c33851ab106e5b0121f800c31e42636d870

    SHA512

    dc6b2ceb1b2847f53f866a154a6ace2faf3782ce74df4ed3920fbc73994796d0518bc1ef06648d4800e1ace8462d1af11cdb8b5ecbbf2d5d3389e2a439764f2d

  • C:\Users\Admin\AppData\Local\Temp\nsf3A6A.tmp\dlmgn.exe.config

    Filesize

    291B

    MD5

    7f9dda91f4aada0a673991e0a0d04b7a

    SHA1

    9736abd42acff7db5b0551294f533dcb1a1a5cf7

    SHA256

    b50e8b399b9560285ec9572c1490613cdbc4d5ad4ac29db955c45c10a28b04fc

    SHA512

    d9de3d0204ae178972259cec7882845f654dad9082a20aa629c47b93f0e9d71e568e901d20c68e14a48ddd29f72b857b8509c401a16c65d8f37b5485ae0cdb1e

  • memory/244-6-0x00007FF9D6E95000-0x00007FF9D6E96000-memory.dmp

    Filesize

    4KB

  • memory/244-7-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-18-0x0000000001560000-0x0000000001570000-memory.dmp

    Filesize

    64KB

  • memory/244-21-0x000000001C9F0000-0x000000001CEBE000-memory.dmp

    Filesize

    4.8MB

  • memory/244-22-0x000000001CEC0000-0x000000001CF5C000-memory.dmp

    Filesize

    624KB

  • memory/244-23-0x000000001CFF0000-0x000000001D052000-memory.dmp

    Filesize

    392KB

  • memory/244-24-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-25-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-26-0x0000000001570000-0x0000000001578000-memory.dmp

    Filesize

    32KB

  • memory/244-27-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-29-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-28-0x00007FF9D6E95000-0x00007FF9D6E96000-memory.dmp

    Filesize

    4KB

  • memory/244-30-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-31-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-32-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-33-0x00000000209A0000-0x0000000020ADC000-memory.dmp

    Filesize

    1.2MB

  • memory/244-34-0x0000000020FF0000-0x00000000214FE000-memory.dmp

    Filesize

    5.1MB

  • memory/244-35-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-36-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB

  • memory/244-38-0x00007FF9D6BE0000-0x00007FF9D7581000-memory.dmp

    Filesize

    9.6MB