Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 20:55

General

  • Target

    64bd2f10d23546457727fa5236217d06_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    64bd2f10d23546457727fa5236217d06

  • SHA1

    195f99d4f318b311c38dd2bedadd427361f552aa

  • SHA256

    6d1f5160fd581f155155e63457bd652c47627f607215a6c82c0cd218c3aed51c

  • SHA512

    3d7ac632f3f856a2d80f9c8ef12a7a364c6a98df3d569d40a5df6f0b15251ff1fa1541b4b516d818e4faf699b5e9eec9b9165e85f14cfd7603c1a1a90c84353f

  • SSDEEP

    24576:lWxhHS/BqXw8fAn4ouMfKDmrSuc8hbq04HotXXjUtPkF1WjMxyspg8P:HWTI0AnrSeS0j1NxyTo

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64bd2f10d23546457727fa5236217d06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\64bd2f10d23546457727fa5236217d06_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76b8adda1f83a2f5541d0c6fb4bed3c0

    SHA1

    9d2ee78bd9b76adf551eeba66107f84f419b62f3

    SHA256

    d89839d90a3be03d1171b1789c4b6f0a7d572f1eb5539bd1d2016fd94505c557

    SHA512

    b79c51a720bf853a90b2151b218d9306ddf2b1c7fab1fbbfbe91f12c0dd129c519df11ac8aee212e619a3cb4ff3db2544cae5ea83d1d5668a8f126d290fa5639

  • C:\Users\Admin\AppData\Local\Temp\Cab3304.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3326.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2024-117-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB

  • memory/2024-8-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB

  • memory/2024-116-0x000000001B310000-0x000000001B3BA000-memory.dmp

    Filesize

    680KB

  • memory/2024-0-0x000007FEF59BE000-0x000007FEF59BF000-memory.dmp

    Filesize

    4KB

  • memory/2024-118-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB

  • memory/2024-119-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB

  • memory/2024-120-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB

  • memory/2024-121-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB

  • memory/2024-122-0x000007FEF59BE000-0x000007FEF59BF000-memory.dmp

    Filesize

    4KB

  • memory/2024-123-0x000007FEF5700000-0x000007FEF609D000-memory.dmp

    Filesize

    9.6MB