Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 14:22

General

  • Target

    10ba7ed5ec24763fa834107c63e02222_JaffaCakes118.exe

  • Size

    371KB

  • MD5

    10ba7ed5ec24763fa834107c63e02222

  • SHA1

    26258d379ed64d1b557b049ff00e47711f7971fc

  • SHA256

    e08c6f7ae270a8bc78fa2a2489ad24361317de75755b717cb5c53e1ab5682850

  • SHA512

    0d88e032c6ef007039a1ff96eba3516afb4846817e67151b8844cad064ccf163ab75ddd90df8c0ebe4eb9fb7ad57c64ecd55e9a233a8adb55b71a6a61025a6f2

  • SSDEEP

    6144:cFJ0Bc+gt9cEQtLM+S50pe4vMVwW0PNU+sdzWZwzMxyGPR0MI5pKSYi/0ThYP/aR:ZcxrcE7X4EwW0PdEWSoVSRgePCR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10ba7ed5ec24763fa834107c63e02222_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\10ba7ed5ec24763fa834107c63e02222_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\beejheijdj.exe
      C:\Users\Admin\AppData\Local\Temp\beejheijdj.exe 9)1)0)5)0)1)6)6)4)0)4 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714746136.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3060
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714746136.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2720
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714746136.txt bios get version
        3⤵
          PID:2340
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81714746136.txt bios get version
          3⤵
            PID:2632
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81714746136.txt bios get version
            3⤵
              PID:2480
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 368
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:2748

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\81714746136.txt

                Filesize

                66B

                MD5

                9025468f85256136f923096b01375964

                SHA1

                7fcd174999661594fa5f88890ffb195e9858cc52

                SHA256

                d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                SHA512

                92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

              • C:\Users\Admin\AppData\Local\Temp\81714746136.txt

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • C:\Users\Admin\AppData\Local\Temp\81714746136.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • \Users\Admin\AppData\Local\Temp\beejheijdj.exe

                Filesize

                631KB

                MD5

                015bb7953acd60ca049320c4abeae2b5

                SHA1

                450cc3464aaa126e6d8bdad2802093e1b31370d7

                SHA256

                6e8ca330ea3eda3742aeced01248aa645e1f93ee23732512b9bb26dfb5009ef8

                SHA512

                33ec30d87abbf5738fae104fbc2951cd7acee9a45e9299db0bba28b84eb869d5be3b43f7ec93ef1e1577d1a15560649e9aefa7dc48bf124b5a81e7af7b2a2268