Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 06:40

General

  • Target

    6da0d2b790be25b073d604ded1a6400a_JaffaCakes118.exe

  • Size

    469KB

  • MD5

    6da0d2b790be25b073d604ded1a6400a

  • SHA1

    751eb2cb7e2b61fd1d2d48c6454daa2cce2e9c11

  • SHA256

    cb1db5fd55736907febdb8e53adf36a13b59b76b1a96607b3c3b7382f39f1033

  • SHA512

    23926c750e6c17d82912f4ba563df75356a5ca8a2927da92b68fb8b9ad2f9c14682d119a218c8aa43d3689a4d2f80aa75216762b1666fc0be39ad3181b27ad35

  • SSDEEP

    12288:MYeUJAy8nnHpMWI1W2o1ZgeH1JMnljQB2inh:NJAyinH2rW2odVAuh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6da0d2b790be25b073d604ded1a6400a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6da0d2b790be25b073d604ded1a6400a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\ydlysekerzci.exe
      "C:\Users\Admin\AppData\Local\Temp\\ydlysekerzci.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\parent.txt

    Filesize

    469KB

    MD5

    6da0d2b790be25b073d604ded1a6400a

    SHA1

    751eb2cb7e2b61fd1d2d48c6454daa2cce2e9c11

    SHA256

    cb1db5fd55736907febdb8e53adf36a13b59b76b1a96607b3c3b7382f39f1033

    SHA512

    23926c750e6c17d82912f4ba563df75356a5ca8a2927da92b68fb8b9ad2f9c14682d119a218c8aa43d3689a4d2f80aa75216762b1666fc0be39ad3181b27ad35

  • C:\Users\Admin\AppData\Local\Temp\ydlysekerzci.exe

    Filesize

    17KB

    MD5

    a496226166890a5dac20fe739a454648

    SHA1

    ef5a76483e04fc9de642a0970cb132f72fd5c12e

    SHA256

    6bc25cf53dd76c9be6a96e4706e47e037dcfb1636e31a0ea8dd4813f11dbd024

    SHA512

    b882799c5aa1c8914d5bb1b04a34fdd3175a30db903783a2027cc8b60bf63bd08a86281101e1190c428a53ac354fe258ff8721452823357a563401c2198a959f

  • memory/1320-13-0x0000000001610000-0x0000000001618000-memory.dmp

    Filesize

    32KB

  • memory/1320-14-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-7-0x000000001B8F0000-0x000000001B934000-memory.dmp

    Filesize

    272KB

  • memory/1320-9-0x000000001C0C0000-0x000000001C58E000-memory.dmp

    Filesize

    4.8MB

  • memory/1320-10-0x000000001C630000-0x000000001C6CC000-memory.dmp

    Filesize

    624KB

  • memory/1320-6-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-5-0x00007FFE5B255000-0x00007FFE5B256000-memory.dmp

    Filesize

    4KB

  • memory/1320-8-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-15-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-16-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-17-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-18-0x000000001FC80000-0x000000001FCE2000-memory.dmp

    Filesize

    392KB

  • memory/1320-29-0x0000000021E90000-0x0000000022636000-memory.dmp

    Filesize

    7.6MB

  • memory/1320-30-0x00007FFE5AFA0000-0x00007FFE5B941000-memory.dmp

    Filesize

    9.6MB

  • memory/1320-31-0x00007FFE5B255000-0x00007FFE5B256000-memory.dmp

    Filesize

    4KB