Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 03:54

General

  • Target

    894a64009ef08e9f0a851a39e111d573_JaffaCakes118.exe

  • Size

    8.3MB

  • MD5

    894a64009ef08e9f0a851a39e111d573

  • SHA1

    34c782ee7f420a374e76c632ae7ba13bd02a81a3

  • SHA256

    2d6d7d02bd0c04fb3d157c8eb3cfb7d032ff2932290468ce31b550d8f2031ad4

  • SHA512

    113e70280f8dff0d0e7894d83ba82169dcbc58d2acf13fbbb5eb7be668920456890a7be2ff19b26b24920dc5bd2401f35754ad639ab4c1d0945913db55bddbfc

  • SSDEEP

    196608:WA32WnS9okcFEox/vn64R/S4s171aD/y+Fla70Kt3:V3xnSJcyO/q4sv4/yv7

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\894a64009ef08e9f0a851a39e111d573_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\894a64009ef08e9f0a851a39e111d573_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\cmd.exe
      /C "C:\Users\Admin\AppData\Local\TaskHandler\MicrosoftTaskHandler.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Users\Admin\AppData\Local\TaskHandler\MicrosoftTaskHandler.exe
        C:\Users\Admin\AppData\Local\TaskHandler\MicrosoftTaskHandler.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "-Command" "if((Get-ExecutionPolicy ) -ne 'AllSigned') { Set-ExecutionPolicy -Scope Process Bypass }; & 'C:\Users\Admin\AppData\Local\Temp\\DefaultPS.ps1'"
          4⤵
          • Adds Run key to start application
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 124
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\TaskHandler\MicrosoftTaskHandler.exe

    Filesize

    8.3MB

    MD5

    894a64009ef08e9f0a851a39e111d573

    SHA1

    34c782ee7f420a374e76c632ae7ba13bd02a81a3

    SHA256

    2d6d7d02bd0c04fb3d157c8eb3cfb7d032ff2932290468ce31b550d8f2031ad4

    SHA512

    113e70280f8dff0d0e7894d83ba82169dcbc58d2acf13fbbb5eb7be668920456890a7be2ff19b26b24920dc5bd2401f35754ad639ab4c1d0945913db55bddbfc

  • C:\Users\Admin\AppData\Local\Temp\DefaultPS.ps1

    Filesize

    158B

    MD5

    f2b997ea6971154f1fa024e17decedcd

    SHA1

    f0397ba7cfeff7f247fcdfab7a324441e011d5cc

    SHA256

    9faa810439cab9f35b1000360ac6f31e086df9cdeb13ee29273a83b9d5560aea

    SHA512

    6f64aa929789000c01d5baba60ce5f1ccced36b3429a737383821838eaba492ec0dc35a4c3d0797051a04137241a814795ff170a9d015cab1fa134beafe08c25

  • memory/2224-31-0x0000000001380000-0x0000000001381000-memory.dmp

    Filesize

    4KB

  • memory/2224-7-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2224-19-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2224-17-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2224-29-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2224-12-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2224-9-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2224-42-0x0000000000400000-0x0000000001371000-memory.dmp

    Filesize

    15.4MB

  • memory/2224-5-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2224-24-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2224-2-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2224-0-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2224-30-0x00000000007D3000-0x0000000000B21000-memory.dmp

    Filesize

    3.3MB

  • memory/2224-35-0x0000000001380000-0x0000000001381000-memory.dmp

    Filesize

    4KB

  • memory/2224-43-0x0000000000400000-0x0000000001371000-memory.dmp

    Filesize

    15.4MB

  • memory/2224-33-0x0000000001380000-0x0000000001381000-memory.dmp

    Filesize

    4KB

  • memory/2224-14-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2224-22-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2224-4-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2224-50-0x0000000000400000-0x0000000001371000-memory.dmp

    Filesize

    15.4MB

  • memory/2224-51-0x00000000007D3000-0x0000000000B21000-memory.dmp

    Filesize

    3.3MB

  • memory/2224-27-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2468-76-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/2468-92-0x0000000000400000-0x0000000001371000-memory.dmp

    Filesize

    15.4MB

  • memory/2468-74-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/2468-71-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2468-69-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2468-66-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2468-64-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2468-61-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2468-59-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2468-56-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2468-54-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2468-91-0x0000000000400000-0x0000000001371000-memory.dmp

    Filesize

    15.4MB