Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 23:08

General

  • Target

    437b2e6037cbc84b412621415dff7a2e_JaffaCakes118.exe

  • Size

    709KB

  • MD5

    437b2e6037cbc84b412621415dff7a2e

  • SHA1

    df15949cbd7f68bd258489ba0605087236cd1151

  • SHA256

    162a6790dc83ba17c41e5875cbee8943de8b4bc070f204a666d34963485cac88

  • SHA512

    37696574b534555450fe143f02d59764b2022458d4785cf6431e5ff8d78612b309ffceef978abe351879b0cd90df23ebd9cb70a65965dd8b0e460243d22ed597

  • SSDEEP

    12288:wy9ajzimKYXi4M6hprwk5tdeKSpPFKg9CKtG4KdUxlzRZZhV1zGQGvZKrNmZgdP7:wmOzrKMpM6YSt3imKtG4uUrXrV1zGQuW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\437b2e6037cbc84b412621415dff7a2e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\437b2e6037cbc84b412621415dff7a2e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Local\Temp\bedgcafgge.exe
      C:\Users\Admin\AppData\Local\Temp\bedgcafgge.exe 2|8|9|8|2|7|7|5|5|4|4 LUhAPDsqMi0wMxwtS0w6TkI9OCscK0w9S09NS0REPzktHic7QVFNQj84LSw0KxcnQUI9OCscK05KRjxTPE1aREA5Ny8sKh4oTEBNUkFQV0xKSjZhb29sNi0namp0Jz1ATkcpUkdHJT9JSSlESkJNGCY7SkI8RkRAOR4nOyk7JiobKkAuOyUoGC09LDgoLRwtPCs1KyoZKj8xOSspFydOS0g/UD9QXUhJQVQ6PFQ4HCtOSkY8UzxNWkBRSD81FydOS0g/UD9QXUY4RUM2GSpAVEFdTUlEOxkoQFNBW0FFO0RHRz44GytETUtLV0BLSFJOQU47KBcnUkE6SUZVS1NXTEpKNhkqUUk5MBgmPFEqNmhcbG8eJ0lNTE1CSEBbU0NEOkdLPkJIPENBU0pDNR4oQk5aTlFMTEBFQzZtbXBhHC1KPExTS0dESUNbU0s8Sl09OlROOS4eJz9BQj5ROCwcK0dLVjxXRzpIRD9bQ0Y6SldJTUA/OWJfZGpdHig9SlJKSE05O1dHSTY0LyouMiwlKTIyJy0wHCtOOUk5SkU+R1pFSlFMOERKNl9cZ29hHidLQUs+NiwvLzIwKSwoNy4ZKj9LU0xERjlCWE1ESEE5NSctJzApKjAlNDYxMDEpMyNJSA==
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81715728144.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2888
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81715728144.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4636
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81715728144.txt bios get version
        3⤵
          PID:3952
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715728144.txt bios get version
          3⤵
            PID:2152
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81715728144.txt bios get version
            3⤵
              PID:4704
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 908
              3⤵
              • Program crash
              PID:2272
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3500 -ip 3500
          1⤵
            PID:4924

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\81715728144.txt

                  Filesize

                  66B

                  MD5

                  9025468f85256136f923096b01375964

                  SHA1

                  7fcd174999661594fa5f88890ffb195e9858cc52

                  SHA256

                  d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                  SHA512

                  92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

                • C:\Users\Admin\AppData\Local\Temp\81715728144.txt

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • C:\Users\Admin\AppData\Local\Temp\81715728144.txt

                  Filesize

                  58B

                  MD5

                  f8e2f71e123c5a848f2a83d2a7aef11e

                  SHA1

                  5e7a9a2937fa4f06fdf3e33d7def7de431c159b4

                  SHA256

                  79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121

                  SHA512

                  8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

                • C:\Users\Admin\AppData\Local\Temp\bedgcafgge.exe

                  Filesize

                  1.1MB

                  MD5

                  32e96d61328602d355272e4fbab2bb9a

                  SHA1

                  8785ea49b64a4856753b2e4c093722f13cc88e06

                  SHA256

                  a80801ac3706388a4385d00c8ee036079121ec1dbab615f66b6afc1ef7cf7dec

                  SHA512

                  11fab887fff541ad596ee679568a500963907be3fab8dc2ac94af7bdb9ba1799040e4faf1abbfd9225a44fef90f2f9824cd2ad68bf2914404ac7a42e1f56a73a

                • C:\Users\Admin\AppData\Local\Temp\nsa7AFD.tmp\ZipDLL.dll

                  Filesize

                  163KB

                  MD5

                  2dc35ddcabcb2b24919b9afae4ec3091

                  SHA1

                  9eeed33c3abc656353a7ebd1c66af38cccadd939

                  SHA256

                  6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

                  SHA512

                  0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

                • C:\Users\Admin\AppData\Local\Temp\nsa7AFD.tmp\jjlvvnt.dll

                  Filesize

                  161KB

                  MD5

                  91512fa4159f8ab72407d9a85d3495c1

                  SHA1

                  d2f195938e3830f22436562c1c87de0595854892

                  SHA256

                  ad6b9b9174051ea4225442259250cd0c5214b2fe00526ad9d59c72c9cc4cc9b2

                  SHA512

                  01dcc54fb3e2af3ac3a8b12851212f78c8fdb818c09e94885a48b3abe5e405c249fd4d96590a72b8b2df438fdfa0ea36eaf01121e42147fe983c64acfff511f2