Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 12:05

General

  • Target

    179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe

  • Size

    220KB

  • MD5

    179680487558a29bcea4d8e8178a0ca7

  • SHA1

    99038ba9bcfcab13a686de8ab11ed0891c74c3d6

  • SHA256

    2b5c023c25af36dcfcf59a6b960065d709ee68e75419473681776561a037dbe7

  • SHA512

    4ac6fec73e3a540cd81e435111dacd688d40556a80f27989bf338c7935a985e0e28dd855aa4fc8a21ea27a6792e409e643bd3981990252c28fb4284810dad75e

  • SSDEEP

    6144:l1cLTFofH3UorgDHojaUX8j3G4fhMiJ8nnnng1wte39fDyelW0ixs0Jm651kgTOD:l1cLTsxywW3xfqiJ8nnnngaghDJ5ixJK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Windows\SYSTEM32\svchost.exe
      svchost.exe
      2⤵
        PID:1120
        • C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
          C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
          3⤵
          • Executes dropped EXE
          PID:2064
          • C:\Windows\SYSTEM32\svchost.exe
            svchost.exe
            4⤵
              PID:3160
      • C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
        C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
        1⤵
        • Executes dropped EXE
        PID:4068
        • C:\Windows\system32\svchost.exe
          svchost.exe
          2⤵
          • Drops file in System32 directory
          PID:3960
          • C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
            C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
            3⤵
            • Executes dropped EXE
            PID:2836
            • C:\Windows\SYSTEM32\svchost.exe
              svchost.exe
              4⤵
              • Drops file in System32 directory
              PID:3596
      • C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
        C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
        1⤵
        • Executes dropped EXE
        PID:4928
        • C:\Windows\system32\svchost.exe
          svchost.exe
          2⤵
            PID:3648

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe

          Filesize

          220KB

          MD5

          179680487558a29bcea4d8e8178a0ca7

          SHA1

          99038ba9bcfcab13a686de8ab11ed0891c74c3d6

          SHA256

          2b5c023c25af36dcfcf59a6b960065d709ee68e75419473681776561a037dbe7

          SHA512

          4ac6fec73e3a540cd81e435111dacd688d40556a80f27989bf338c7935a985e0e28dd855aa4fc8a21ea27a6792e409e643bd3981990252c28fb4284810dad75e

        • memory/1120-8-0x0000000140000000-0x0000000140020000-memory.dmp

          Filesize

          128KB

        • memory/1120-6-0x0000000140000000-0x0000000140020000-memory.dmp

          Filesize

          128KB

        • memory/1120-7-0x000002022DF80000-0x000002022DF81000-memory.dmp

          Filesize

          4KB

        • memory/2064-32-0x0000000002190000-0x0000000002459000-memory.dmp

          Filesize

          2.8MB

        • memory/2064-31-0x00000000020D0000-0x000000000218E000-memory.dmp

          Filesize

          760KB

        • memory/2836-61-0x0000000000C30000-0x0000000000CEE000-memory.dmp

          Filesize

          760KB

        • memory/2836-62-0x0000000000E50000-0x0000000001119000-memory.dmp

          Filesize

          2.8MB

        • memory/3160-24-0x0000000140000000-0x0000000140020000-memory.dmp

          Filesize

          128KB

        • memory/3596-65-0x0000000140000000-0x0000000140020000-memory.dmp

          Filesize

          128KB

        • memory/4068-46-0x0000000000E80000-0x0000000000F3E000-memory.dmp

          Filesize

          760KB

        • memory/4068-47-0x0000000000F40000-0x0000000001209000-memory.dmp

          Filesize

          2.8MB

        • memory/4492-15-0x00000000021F0000-0x00000000024B9000-memory.dmp

          Filesize

          2.8MB

        • memory/4492-14-0x0000000002130000-0x00000000021EE000-memory.dmp

          Filesize

          760KB

        • memory/4492-0-0x0000000010000000-0x0000000010007000-memory.dmp

          Filesize

          28KB

        • memory/4492-5-0x00000000004C0000-0x00000000004C1000-memory.dmp

          Filesize

          4KB

        • memory/4928-79-0x0000000000D90000-0x0000000000E4E000-memory.dmp

          Filesize

          760KB

        • memory/4928-80-0x0000000000E50000-0x0000000001119000-memory.dmp

          Filesize

          2.8MB