Analysis

  • max time kernel
    134s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 22:48

General

  • Target

    852ca9b65bd1aef967f8513890f00a24_JaffaCakes118.exe

  • Size

    582KB

  • MD5

    852ca9b65bd1aef967f8513890f00a24

  • SHA1

    ff25d0828624c70363e5d7b00fc8ab037986f6d4

  • SHA256

    23715a39b7bf75785f3bc0521cfab6e427cb396486b0a1cedd4c9022abab1f3c

  • SHA512

    06f3f3258cc6b026a27b56420c5e2d2f7e76a57bfe69aefdea27738291f8aecdef607492ddd4ec859027ed8a2e88bac057358abfb9a26a2a81db8f0707b16f0e

  • SSDEEP

    12288:PlLTBqYuWFcov/H1VQLUXmORdju4RERZMH0c:PlL1qYuWWWoammdjbSPc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\852ca9b65bd1aef967f8513890f00a24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\852ca9b65bd1aef967f8513890f00a24_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\nst43D1.tmp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\nst43D1.tmp\setup.exe" /S
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c WMIC path win32_process WHERE Processid=4028 get Commandline
        3⤵
          PID:4704
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC path win32_process WHERE Processid=4028 get Commandline
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c WMIC path win32_process WHERE Processid=3500 get Commandline
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4108
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC path win32_process WHERE Processid=3500 get Commandline
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3700
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c WMIC path win32_process WHERE Processid=3476 get Commandline
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4312
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC path win32_process WHERE Processid=3476 get Commandline
            4⤵
              PID:4840
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c WMIC path win32_process WHERE Processid=4028 get Commandline
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4896
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              WMIC path win32_process WHERE Processid=4028 get Commandline
              4⤵
                PID:2208
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c WMIC path win32_process WHERE Processid=3500 get Commandline
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2936
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                WMIC path win32_process WHERE Processid=3500 get Commandline
                4⤵
                  PID:3876
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c WMIC path win32_process WHERE Processid=3476 get Commandline
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4672
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  WMIC path win32_process WHERE Processid=3476 get Commandline
                  4⤵
                    PID:3568

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\nst43D1.tmp\D1958.dll

              Filesize

              14KB

              MD5

              904beebec2790ee2ca0c90fc448ac7e0

              SHA1

              40fabf1eb0a3b7168351c4514c5288216cb1566d

              SHA256

              f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222

              SHA512

              8bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa

            • C:\Users\Admin\AppData\Local\Temp\nst43D1.tmp\setup.exe

              Filesize

              529KB

              MD5

              3de775d4bc8dca7b407a6a077dee2d5f

              SHA1

              f4de188f7b52e68cb5f47fe542ad195d242c5bdd

              SHA256

              b70c82103d2cc7d72747846bde741f1810e0daf6f618ebf265dd02ebbf54d9e7

              SHA512

              7324d58f78a710ff5c35831b78ed106c8a4a8598f3dfb19271aa1f3232397529b4f077d042c5d5a0e513a89a34c2c4839eb6c652df654e66399c82003a6b7494