Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 15:39

General

  • Target

    136010f763273654bfe7a55b0bfe4e94_JaffaCakes118.exe

  • Size

    581KB

  • MD5

    136010f763273654bfe7a55b0bfe4e94

  • SHA1

    c98d3a492fcdf56db799b8bd885d829d71a888a0

  • SHA256

    4476dab49655761542e9c5319d78fbcf475fd9d7967aaaf7d099361ff07733ff

  • SHA512

    ca2c62bc7c676216062ca9ea7979e17b350c0c68804e5e9ed44e6729427e7e2df98b8a49fa3036e92da800bf759012e253a67c9f3f0494d62d95bdf555bb65f7

  • SSDEEP

    12288:ayC73yJg1PYuWJp9f++3QLa3nL0lqLbt3nQgfGA2reW4AfAcktWTEmc:aywug1gxfZ3QLKniqN3nQgf6rH4ckWQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\136010f763273654bfe7a55b0bfe4e94_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\136010f763273654bfe7a55b0bfe4e94_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Local\Temp\1431842551.exe
      C:\Users\Admin\AppData\Local\Temp\1431842551.exe 0/7/9/7/0/7/8/3/8/3/5 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714837162.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714837162.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81714837162.txt bios get version
        3⤵
          PID:2472
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81714837162.txt bios get version
          3⤵
            PID:2440
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81714837162.txt bios get version
            3⤵
              PID:2916
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 368
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:1756

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\81714837162.txt

                Filesize

                66B

                MD5

                9025468f85256136f923096b01375964

                SHA1

                7fcd174999661594fa5f88890ffb195e9858cc52

                SHA256

                d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                SHA512

                92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

              • C:\Users\Admin\AppData\Local\Temp\81714837162.txt

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • C:\Users\Admin\AppData\Local\Temp\81714837162.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • C:\Users\Admin\AppData\Local\Temp\nsy723.tmp\nraigbw.dll

                Filesize

                153KB

                MD5

                fbc2f25eece1f6307c2988c4e34d2e30

                SHA1

                a1bf3b628c671cbb1528122e554086e851ff8073

                SHA256

                01ac6332290592c8d229fb2a650c7ce6fde6a3fe40025045adafb76b718cf140

                SHA512

                d54f8f2bcf2183c448e336543a592f318b91cd8563a2fee436d451d82640fec1fe0927a807e505664c31b3502766cb71bc7628fa6a0b351fb271b1fa13f2909e

              • \Users\Admin\AppData\Local\Temp\1431842551.exe

                Filesize

                788KB

                MD5

                f064678b83ee6fb859744275b9e5f51b

                SHA1

                66166c3418f7c49a9b999417fd837c3ece1b9d47

                SHA256

                14dd610f549a06e1317e730af2bd6eb6c434ecff0855570b3540dca820a348cc

                SHA512

                f085002b5128227099861b1cba5048e3fa59c20a6dc62ef4e0c88d3b56e8cb7184373788069c11e303041e6cf1ada761c5f8f3807a1c819fcd688dff04acd196

              • \Users\Admin\AppData\Local\Temp\nsy723.tmp\nsisunz.dll

                Filesize

                40KB

                MD5

                5f13dbc378792f23e598079fc1e4422b

                SHA1

                5813c05802f15930aa860b8363af2b58426c8adf

                SHA256

                6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                SHA512

                9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5