Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 20:45

General

  • Target

    8bba1eadc852275dbe24dba3528cbd5d_JaffaCakes118.exe

  • Size

    615KB

  • MD5

    8bba1eadc852275dbe24dba3528cbd5d

  • SHA1

    8bbd1ddfdb9f13a32ef4e2c3c8cd425062d5fe43

  • SHA256

    141210c44985763433ffb2fa35adab039d3d524a3b0851af655af8f0ac3280f1

  • SHA512

    33977e59beea28510c66f3a9461e31bb9035cdfc8b7573e69703638ec74ccc2bdec0acc281f8ee1a1e8dd0f4c34205fab80f884426d9b77a442355a4cf201888

  • SSDEEP

    12288:Zgcs1dt/FBFYbPIm/tmGiRxkogHg69uu/1SJHiZj0NkCeY3v9m:ZgPfnDYTr1QRxoAmuaSJCjoP/vM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bba1eadc852275dbe24dba3528cbd5d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bba1eadc852275dbe24dba3528cbd5d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\dcgcabfhjcfd.exe
      C:\Users\Admin\AppData\Local\Temp\dcgcabfhjcfd.exe 7-2-1-9-5-5-0-9-4-5-7 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81717274715.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81717274715.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81717274715.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81717274715.txt bios get version
        3⤵
          PID:2432
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81717274715.txt bios get version
          3⤵
            PID:2608
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 368
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:1984

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\81717274715.txt

        Filesize

        66B

        MD5

        9025468f85256136f923096b01375964

        SHA1

        7fcd174999661594fa5f88890ffb195e9858cc52

        SHA256

        d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

        SHA512

        92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

      • \Users\Admin\AppData\Local\Temp\dcgcabfhjcfd.exe

        Filesize

        828KB

        MD5

        2cbcf0ca153f4c932a196610930555cb

        SHA1

        9bb5589a28f9d1376909c382e3c0f0b967e87fb6

        SHA256

        b54ce0121af6668e635b864dc77fe483107de247a0c3fe5e03faf9f3feae046d

        SHA512

        8aff6b79a2862968cd8ffee37312e7b77122289163cb1a125ed8a123bc7f6f37eafb4593002bc74b1f36189d073690f22b439407856ab2950aed5f1c28375600

      • \Users\Admin\AppData\Local\Temp\nst17C6.tmp\nsisunz.dll

        Filesize

        40KB

        MD5

        5f13dbc378792f23e598079fc1e4422b

        SHA1

        5813c05802f15930aa860b8363af2b58426c8adf

        SHA256

        6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

        SHA512

        9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

      • \Users\Admin\AppData\Local\Temp\nst17C6.tmp\qzpwo.dll

        Filesize

        152KB

        MD5

        9980000e7a606aa5ed006157d5b720b4

        SHA1

        7fefa3efb773296095821c2c7f01eee6ee485299

        SHA256

        b2fec8da2015c6eb860a39efe74a296f9a1a5eaa19b3db04b9eabe1174253ccf

        SHA512

        81c81b0ffce2ff34523053a668b29841b9c2a23d98c32caa5884409a6f8f2d25afd69fc522b7416d85a600f165a1be43001ef4164a11d58afd9740fc11fb4311