Analysis

  • max time kernel
    132s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 22:48

General

  • Target

    852ca9b65bd1aef967f8513890f00a24_JaffaCakes118.exe

  • Size

    582KB

  • MD5

    852ca9b65bd1aef967f8513890f00a24

  • SHA1

    ff25d0828624c70363e5d7b00fc8ab037986f6d4

  • SHA256

    23715a39b7bf75785f3bc0521cfab6e427cb396486b0a1cedd4c9022abab1f3c

  • SHA512

    06f3f3258cc6b026a27b56420c5e2d2f7e76a57bfe69aefdea27738291f8aecdef607492ddd4ec859027ed8a2e88bac057358abfb9a26a2a81db8f0707b16f0e

  • SSDEEP

    12288:PlLTBqYuWFcov/H1VQLUXmORdju4RERZMH0c:PlL1qYuWWWoammdjbSPc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\852ca9b65bd1aef967f8513890f00a24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\852ca9b65bd1aef967f8513890f00a24_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\nst1F65.tmp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\nst1F65.tmp\setup.exe" /S
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c WMIC path win32_process WHERE Processid=1936 get Commandline
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          WMIC path win32_process WHERE Processid=1936 get Commandline
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1536
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c WMIC path win32_process WHERE Processid=1064 get Commandline
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:296
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          WMIC path win32_process WHERE Processid=1064 get Commandline
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:540
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c WMIC path win32_process WHERE Processid=1028 get Commandline
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          WMIC path win32_process WHERE Processid=1028 get Commandline
          4⤵
            PID:1340
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c WMIC path win32_process WHERE Processid=1936 get Commandline
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC path win32_process WHERE Processid=1936 get Commandline
            4⤵
              PID:1884
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c WMIC path win32_process WHERE Processid=1064 get Commandline
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1856
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              WMIC path win32_process WHERE Processid=1064 get Commandline
              4⤵
                PID:348
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c WMIC path win32_process WHERE Processid=1028 get Commandline
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:300
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                WMIC path win32_process WHERE Processid=1028 get Commandline
                4⤵
                  PID:1400

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\nst1F65.tmp\D1958.dll

            Filesize

            14KB

            MD5

            904beebec2790ee2ca0c90fc448ac7e0

            SHA1

            40fabf1eb0a3b7168351c4514c5288216cb1566d

            SHA256

            f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222

            SHA512

            8bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa

          • \Users\Admin\AppData\Local\Temp\nst1F65.tmp\setup.exe

            Filesize

            529KB

            MD5

            3de775d4bc8dca7b407a6a077dee2d5f

            SHA1

            f4de188f7b52e68cb5f47fe542ad195d242c5bdd

            SHA256

            b70c82103d2cc7d72747846bde741f1810e0daf6f618ebf265dd02ebbf54d9e7

            SHA512

            7324d58f78a710ff5c35831b78ed106c8a4a8598f3dfb19271aa1f3232397529b4f077d042c5d5a0e513a89a34c2c4839eb6c652df654e66399c82003a6b7494