Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 00:51

General

  • Target

    8c5ff664440d0134f317ebbdebca6f7f_JaffaCakes118.exe

  • Size

    426KB

  • MD5

    8c5ff664440d0134f317ebbdebca6f7f

  • SHA1

    f5454ed8399d7024a45d51c20aa5be3bfb775785

  • SHA256

    b79248198924cac145580c98378324fe16ab319e5da4d1e7a1b379d375f0b410

  • SHA512

    2ddbee7e12a9df9032aae61dc03cbf407bbba9fdcc66c9d5dea042e05165eba8388aa08e3d8e161be25b70152c8dec2c495ffd95a2c38efd694f4df48ab8ec3f

  • SSDEEP

    12288:qZ6ETUFctxIDSXXKpZYnXcyu9UPEmSQ7pB/Qd41gG:qwEYLDSn1Xcysr6B/yG

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c5ff664440d0134f317ebbdebca6f7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c5ff664440d0134f317ebbdebca6f7f_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\8c5ff664440d0134f317ebbdebca6f7f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\8c5ff664440d0134f317ebbdebca6f7f_JaffaCakes118.exe /stage2 /parent 2172
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\system32\cmd.exe
        cmd /c net start trustedinstaller >nul 2>&1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\system32\net.exe
          net start trustedinstaller
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 start trustedinstaller
            5⤵
              PID:2484
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c pause
          3⤵
            PID:2660

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2172-0-0x0000000140000000-0x000000014010A000-memory.dmp

              Filesize

              1.0MB

            • memory/2172-2-0x0000000140000000-0x000000014010A000-memory.dmp

              Filesize

              1.0MB

            • memory/2464-1-0x0000000140000000-0x000000014010A000-memory.dmp

              Filesize

              1.0MB

            • memory/2464-3-0x0000000140000000-0x000000014010A000-memory.dmp

              Filesize

              1.0MB