Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 09:12

General

  • Target

    294317d617f8c4cc054b16b0beda02bc_JaffaCakes118.exe

  • Size

    8.0MB

  • MD5

    294317d617f8c4cc054b16b0beda02bc

  • SHA1

    329cf396dfe1c5cc4b9833ab181f2ba825568c37

  • SHA256

    f730f1c325e0654a2e0f12b50d34f7ecfc4bb36bf954c711a1aadbc0acde4ad4

  • SHA512

    a018ac517d322934fadf37bf4538f8e4231752e2a20fed366c8b848b71da83b584a88c9eca822d7bf307afd4f9f513d16a5e1189186b252fbe535214375481c8

  • SSDEEP

    196608:cNNJ7LLCI2JF+/yYbRnY/lel2u4VBTZQl:cNrLmI2ybRnvkuiBTZI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\294317d617f8c4cc054b16b0beda02bc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\294317d617f8c4cc054b16b0beda02bc_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\Kabuto.Installer.exe
      "C:\Users\Admin\AppData\Local\Temp\Kabuto.Installer.exe" -k lawKjWVZz01DWkfcpROSIA
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab3507.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Kabuto.Installer.exe

    Filesize

    7.9MB

    MD5

    97c437733a9032dfbc564cd36d11d652

    SHA1

    5d4ef047049c46200a99cb44169e786cca8104af

    SHA256

    19f9c3d8a19866687fc1a0f8aaf6ae7bddede27f24fe1e3eb800dd985689b5cc

    SHA512

    889b3c5d4c4c23472ed543e1e03c177edc2431cf55f061b5dbd4140291d85d90d45155e92106f6827bf907e1fa3831bbeed934ee3a7afbf8af955639c473043c

  • C:\Users\Admin\AppData\Local\Temp\Tar3558.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1964-0-0x000007FEF60B3000-0x000007FEF60B4000-memory.dmp

    Filesize

    4KB

  • memory/1964-1-0x00000000010E0000-0x00000000018D8000-memory.dmp

    Filesize

    8.0MB

  • memory/1964-5-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/1964-68-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-23-0x0000000002670000-0x000000000268A000-memory.dmp

    Filesize

    104KB

  • memory/2668-27-0x000000001B310000-0x000000001B31C000-memory.dmp

    Filesize

    48KB

  • memory/2668-20-0x000000001B2C0000-0x000000001B308000-memory.dmp

    Filesize

    288KB

  • memory/2668-21-0x0000000000D70000-0x0000000000D94000-memory.dmp

    Filesize

    144KB

  • memory/2668-22-0x00000000025C0000-0x00000000025D8000-memory.dmp

    Filesize

    96KB

  • memory/2668-18-0x0000000000D50000-0x0000000000D76000-memory.dmp

    Filesize

    152KB

  • memory/2668-26-0x0000000002720000-0x000000000272E000-memory.dmp

    Filesize

    56KB

  • memory/2668-25-0x00000000025E0000-0x00000000025E8000-memory.dmp

    Filesize

    32KB

  • memory/2668-24-0x0000000000B30000-0x0000000000B3A000-memory.dmp

    Filesize

    40KB

  • memory/2668-19-0x000000001B1E0000-0x000000001B23C000-memory.dmp

    Filesize

    368KB

  • memory/2668-28-0x000000001BF60000-0x000000001C00A000-memory.dmp

    Filesize

    680KB

  • memory/2668-29-0x000000001BE20000-0x000000001BE38000-memory.dmp

    Filesize

    96KB

  • memory/2668-30-0x000000001B320000-0x000000001B334000-memory.dmp

    Filesize

    80KB

  • memory/2668-31-0x000000001B350000-0x000000001B358000-memory.dmp

    Filesize

    32KB

  • memory/2668-32-0x000000001B7C0000-0x000000001B7C8000-memory.dmp

    Filesize

    32KB

  • memory/2668-17-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-16-0x0000000000180000-0x0000000000962000-memory.dmp

    Filesize

    7.9MB

  • memory/2668-67-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-15-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB