Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 16:48

General

  • Target

    10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe

  • Size

    558KB

  • MD5

    10f9a88c7a8c0f30d9e9533f973aba44

  • SHA1

    e751c2e099593fc52968b1dffb28a191c5fc90ab

  • SHA256

    f9628c9278c1ae0e666ee3ddfda70614d6c22af1c6b70435f7d8b1651051f4f3

  • SHA512

    54c017956d148e9c9d291259ce6c68b9fe526d7f9755bbbb81deea27dbbff3efbf4785700f4665776a47b668b6ceceea68c0a5e6f5b5196fa00a979c04dc4bc7

  • SSDEEP

    12288:OEaZkIWPAbC8EmNuJVMlnG/YmBWl7dlZGLw1CtwD8UCtAyI:O9GAReJVe0YIW33NCaDXCa1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\10f9a88c7a8c0f30d9e9533f973aba44_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\eccabfbcefh.exe
      C:\Users\Admin\AppData\Local\Temp\eccabfbcefh.exe 0-1-5-4-0-1-1-8-9-5-0 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2612
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version
        3⤵
          PID:2504
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81714754930.txt bios get version
          3⤵
            PID:2508
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 368
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:2912

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\81714754930.txt

        Filesize

        66B

        MD5

        9025468f85256136f923096b01375964

        SHA1

        7fcd174999661594fa5f88890ffb195e9858cc52

        SHA256

        d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

        SHA512

        92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

      • \Users\Admin\AppData\Local\Temp\eccabfbcefh.exe

        Filesize

        765KB

        MD5

        adf74b9806a7ce6d3cf3d2e7220826ab

        SHA1

        508f3608eefbbed7b7c28827d490005cb41981d5

        SHA256

        7b00665b34c362153be1185391988c948502279d9d6c990def06959faf5aea53

        SHA512

        ecc6c4fc7960c00ec389255955cc173a8e4b7334349e140b43bd0e9f824fea159909c4b33e3a83c84b20347abffe1cb84e4e109ca0dbbceb0c2fc1406786ba89

      • \Users\Admin\AppData\Local\Temp\nsd140E.tmp\kyhrd.dll

        Filesize

        125KB

        MD5

        90de0d49e928a4199475d30b3a7a7a37

        SHA1

        777711d533adbada6413c27afdb83d027177e7ef

        SHA256

        20b4a909ae1f1b7be6f79deb355558bfcc923e9cb0fc59aa44d4f25f75fdacf8

        SHA512

        c5fb7116a55a238b397b88b881905bf31d13d48f3f43c1ef36194b88d5e2b6bcaf5eb205d71f458ce19c60f9b47929b8e3cdd17edc69f09d32e5f5d58d5b5bc4

      • \Users\Admin\AppData\Local\Temp\nsd140E.tmp\nsisunz.dll

        Filesize

        40KB

        MD5

        5f13dbc378792f23e598079fc1e4422b

        SHA1

        5813c05802f15930aa860b8363af2b58426c8adf

        SHA256

        6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

        SHA512

        9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5