Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 05:25

General

  • Target

    2d8fe3ba8038b2a9c44f5eac7c921eb2_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    2d8fe3ba8038b2a9c44f5eac7c921eb2

  • SHA1

    8945ec6e043eda1ca61d282ef837e646c4243a08

  • SHA256

    11b914e7e56122744f8ed64a39118b7f007a0ba0743930029e2ecaf658ae193b

  • SHA512

    4838dddcec89a74f836b429fe79c4d3ed51120672449bba231a452200cb6d8d6ec2f6eed14ac1d09984e207846827b17907d50b17391cbbbce25e4adae3a6cbe

  • SSDEEP

    24576:bbSaE4mvt/gFX4kIrwZP8Cyo7nZrg6KW2bEge:bbSv4mvmJ4k4wZkCyojx+Ege

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d8fe3ba8038b2a9c44f5eac7c921eb2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d8fe3ba8038b2a9c44f5eac7c921eb2_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\ebecabfbcejh.exe
        C:\Users\Admin\AppData\Local\Temp\ebecabfbcejh.exe 7]3]0]6]5]6]1]1]7]6]6 KE1JPjgxMi8rGilMUkJKRD48LxkpSD5RV0lNRUhDNioaKEFJTU9DQzwqLywvNCApPkNDPCkaKUlPTz5QPVNeQj43KzYxMRspUkRLUD9LXFVMRzdnc21qNCgsc2xxKENETEUnTUxQJzxKTy1CSEBIHS89R0NCSkI+Nys0Ni8tKy81LTEaKEExNy0rMTQtGik9Lz0nLBouQyw3JyodLz4vNywwGSk+LjotKxspT1FIPk88UV9KTUNVQDxTNxksUExKPlRCTVk/TklBNxspT1FIPk88UV9IPEdEPBkpP1FCX09NRjwfKD9SPlxDRz9GSE0+NxooRU9NT1lBUUhRTT5PPSwbKVNHOkhFUkxVWVBMSzwZKVBGOjIaKj5SMDYaKUtSTk5ER0ReUD9GPExNP0RHQEY+T0xFOiApRE1eUU5ITkJKRTdvbHRkGSlMPlFVTElDTUZYT00+T18+PFNSPCsaKUFGRD9TNzAfKENNWEFZSDxHSEJYP0g8T1lKTz9DPF9bZmxiICk/SVZNRUk7PVxJSjgzMS0rMygrMTgoLCo0HyhOQ0ZCPSsvLDgvLDIrLzMgKT9JVk1FSTs9XFRDSD88MygrLigvMCswJDY5KSw0LTMqSkgaLlQ6N0dod2lmZ1skMV8vKCkoKFFkaGNucG0lR1ErMCktJDJbJVFIVDYuJCVAb2lmX1BiYkVkbiQxXy8tMCszMCYiSkdNR0YeL2MlZ2NqZCRBX1xobyMmPWdxaGdfHi9mLiwoLy0rLDErKzErMyVSYF9bbGIiMmAwLTYtLDAaKFJSRjhic3NpHy1aIjJgICxlZl5uKyctMSstYXFubmooYmtmaSAsZVFuaE5iamU+anFta2hbXkZebltiX3FeXV9qZWx5Hy1gMDMrMyosNTEwLB8xZSouLDItMzIsMDAkK2ArLS85Ki4yMDUqHy1fNjkzMioyNSkqLStVbHJtRnlAMVtkKTBNPS9qR1VsLEdNRnNIZV1pYGNLakZAby1ELGY4Rj1IYkhES2tFaUhyRmNTZ2FRX1tYbDteSkw1eEhlT3VLcl1uRHdBZ1VmMHVbZGlwRVhAYltTL28=
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715318741.txt bios get serialnumber
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2832
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715318741.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2348
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715318741.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:768
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715318741.txt bios get version
          4⤵
            PID:2528
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81715318741.txt bios get version
            4⤵
              PID:2648
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 368
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:1708

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\Local\Temp\81715318741.txt

              Filesize

              66B

              MD5

              9025468f85256136f923096b01375964

              SHA1

              7fcd174999661594fa5f88890ffb195e9858cc52

              SHA256

              d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

              SHA512

              92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

            • C:\Users\Admin\AppData\Local\Temp\File.exe

              Filesize

              556KB

              MD5

              3127eca853f2ec29e44c8e01393fbf3c

              SHA1

              02438fc6a3d87fdad3afa5e8916cec024f71c901

              SHA256

              a67035f97122c1d22630e8957c4af44f778d9dc40492e35dfb8204c39f2746af

              SHA512

              8482b2c4f755600ddcb9b8266dc4da3290b03cc83119809f490de3062972e2818daeeb5dc41dd17ac1a1fc694ed51b11af5a22b04729e7ec314fac829c5b92c5

            • C:\Users\Admin\AppData\Local\Temp\TarB0F.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\Temp\ebecabfbcejh.exe

              Filesize

              764KB

              MD5

              723a26ee62f4b2e0779d8ad68aba0f7d

              SHA1

              39c441549b6938246ed0c677e69dfb0af6d6928b

              SHA256

              286e9544fbba8c16ccdff90140fd784a5bea247b1ecebbaa494b3500e18bac91

              SHA512

              ed8e878ddc17894244aa969b468b8cbaad756fab4a286150b817d0ca563791cd338327a2ef872bc9b4ae7c03f48746788c3df6149f5d770bdc9e647206a2d47d

            • C:\Users\Admin\AppData\Local\Temp\nsoF1F.tmp\jiaqr.dll

              Filesize

              120KB

              MD5

              89e4608116b7cf93d58dd12d29f05d09

              SHA1

              85bc9e10c60e45893d47fcee9e65fd65a496f888

              SHA256

              7b0c35ea732a6745a6f5cff9e548b75bbc4e61bb7b04e813f88c7ed7ceb3cba7

              SHA512

              4142fdaa057e47bf8c5cfd0cdede027fbdda96d2f95916eef3cf74ecc98b2981a8c46b809d2681c0149000763da3336967c08a95bfbec2fe2926ca52ff71c9a1

            • \Users\Admin\AppData\Local\Temp\nsoF1F.tmp\nsisunz.dll

              Filesize

              40KB

              MD5

              5f13dbc378792f23e598079fc1e4422b

              SHA1

              5813c05802f15930aa860b8363af2b58426c8adf

              SHA256

              6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

              SHA512

              9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

            • memory/2208-0-0x000007FEF5DAE000-0x000007FEF5DAF000-memory.dmp

              Filesize

              4KB

            • memory/2208-8-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

              Filesize

              9.6MB

            • memory/2208-61-0x000000001BDE0000-0x000000001BE58000-memory.dmp

              Filesize

              480KB

            • memory/2208-107-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

              Filesize

              9.6MB

            • memory/2208-108-0x000007FEF5DAE000-0x000007FEF5DAF000-memory.dmp

              Filesize

              4KB