Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 21:11

General

  • Target

    8bcc4d1cbecad4721136b590d03a0b6e_JaffaCakes118.exe

  • Size

    624KB

  • MD5

    8bcc4d1cbecad4721136b590d03a0b6e

  • SHA1

    705dfb38710b8cd90957b485cb8477259057e981

  • SHA256

    12eea2303be31b629daf8cb7c5de0fb0336bbaa6153133a0acd5244f7af2dcf7

  • SHA512

    fb9f256da109ab4d06089b1794e09d349374ec1f606b5cc435caf7a7d365a3012b154053d273d3a6e3d81562bccc5c626c435be7073770f13f283d13343e4769

  • SSDEEP

    12288:5UdZT1ZPtL5S05tmnqtfPp7WQfds84tsIDHPYg000wch63NM8I:mdZTX7S05tmqrShHPYxbTw3NM8I

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bcc4d1cbecad4721136b590d03a0b6e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bcc4d1cbecad4721136b590d03a0b6e_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\n9086\s9086.exe
      "C:\Users\Admin\AppData\Local\Temp\n9086\s9086.exe" 60b98b8d7dbdf5e27e919c09tqJ6ysAHVPtU3C4qfnxWSMAF2oIylbY0j1QpvQ4AUNa2E5BSKcLNa1GdGUnneFnua56obabaVr5YFAiE5RXDKcclPCFua30GLFGfYp03MvovQtRiS1AmngQq9gPnUhsv/IWUK8WPhbpW1ycwzgCZhKinpnHLXZhgEZAlXqp0 /v "C:\Users\Admin\AppData\Local\Temp\8bcc4d1cbecad4721136b590d03a0b6e_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9ea5ca2822c78262fc6572133a318d7

    SHA1

    db41ecadb06d6b3e967f670747680a9c4a7c2e8e

    SHA256

    35335e96cc2017ea6fa483ede43de2be7b5076f78fc3895a478cd9642beb726e

    SHA512

    0654f96f5dbc00eb6202f199cd15687c0df39a933a50f38e2b9718d89851c9c35355b7f8f57d14819abb81ea3e6b05ec11d93994e74db8b16a0aa3552e0257b2

  • C:\Users\Admin\AppData\Local\Temp\Tar550A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\n9086\s9086.exe

    Filesize

    373KB

    MD5

    5d3330c2891766f2987b49dd4bdaadfd

    SHA1

    31dbd97c319944a692c47995053c098431bcfdaf

    SHA256

    825418c6c8d0c97c4061c720537223e5d4ea5a49ab8b74910443165a1cef9097

    SHA512

    0880d0381802ec5d3b0a58df7af8232ad96cd5d11475ffd82d95b9a0ac4b1e80585cea78f7f12808d9251253fce07f7ec31f66d97ab46057f4b26205ad4f6414

  • memory/1328-15-0x000007FEF67EE000-0x000007FEF67EF000-memory.dmp

    Filesize

    4KB

  • memory/1328-23-0x000007FEF6530000-0x000007FEF6ECD000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-125-0x0000000000AF0000-0x0000000000B00000-memory.dmp

    Filesize

    64KB

  • memory/1328-126-0x000007FEF67EE000-0x000007FEF67EF000-memory.dmp

    Filesize

    4KB

  • memory/1328-128-0x000007FEF6530000-0x000007FEF6ECD000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-127-0x000007FEF6530000-0x000007FEF6ECD000-memory.dmp

    Filesize

    9.6MB

  • memory/1328-129-0x000007FEF6530000-0x000007FEF6ECD000-memory.dmp

    Filesize

    9.6MB