Malware Analysis Report

2025-06-16 07:07

Sample ID 240602-begqladh88
Target 8c66a81919e6a85068e0f83059323d5a_JaffaCakes118
SHA256 311121bbed782ab0bd9eeccb57d8d9acfd675497f3c2669ece662e67503b2382
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

311121bbed782ab0bd9eeccb57d8d9acfd675497f3c2669ece662e67503b2382

Threat Level: Shows suspicious behavior

The file 8c66a81919e6a85068e0f83059323d5a_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Executes dropped EXE

Loads dropped DLL

Unsigned PE

Program crash

Enumerates physical storage devices

NSIS installer

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 01:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-02 01:03

Reported

2024-06-02 01:05

Platform

win10v2004-20240226-en

Max time kernel

143s

Max time network

152s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3868 wrote to memory of 4908 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3868 wrote to memory of 4908 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3868 wrote to memory of 4908 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4908 -ip 4908

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 600

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3752 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 106.246.116.51.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 01:03

Reported

2024-06-02 01:05

Platform

win7-20240508-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1300 wrote to memory of 2088 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 1300 wrote to memory of 2088 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 1300 wrote to memory of 2088 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 1300 wrote to memory of 2088 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 2088 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2932 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2932 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2932 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2932 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2088 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\WerFault.exe
PID 2088 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\WerFault.exe
PID 2088 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\WerFault.exe
PID 2088 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\1430611339.exe

C:\Users\Admin\AppData\Local\Temp\1430611339.exe 0#2#1#4#9#4#0#9#2#5#0 L05IQDQzMycwGy9TU0FMQEA9Jx4qTkVSVktJR0k7OywgL0JIT0tFRDQwLzU0MR8rOkVENC4bL1BQTkBMP1RWRz89MTQ4MBcrUzxQUUVSXVROQzloa3JrOi8tcm5tKkQ8UUYtVE1PKThMUCVHSUZPHi4/Q0VDQkc/PTI2ODMwNTEsMS0gL0IwOSg0MC0zGy9EMDwpKBwvOzE4LTEeLkArOS0oHipENTssLRcrUElNP1VDUl5MSUVWOEFUPSAtT05GQFU6UlpFVUpAORcrUElNP1VDUl5KOElFNB4qRVhDXlFJSD0XLUBYRV1CSTtISUVDOCAvRk5PS1tCSU1SU0VQPC4XK1Q/P0lLWU1UW0xOTDQeKlZNOzEcJkBTKDsbL1JTTVBASUVWVUBMQ01MQUBJQT5DUFJMOx8rQE9fSVNJVElLRDlrbnVcHipSRVJUTkVFTj5dUFNFUF5AOFVTNDAbL0hHQ0FPOTEXLURTX0JYSjhJSTpdQE5DUFhMS0FENGRcbHNjHys7S1dFSkpBRF1ITDQtMywsKy4yNy0tJzIgJlJETUU7MDAqLDYoNDA4Mh4uQEZTTkNNPERfUkhJPDk1JjEqMjAvNCYoNjIwOC8yKj9MHCZRQTRLanppamtdHC5mLCwrKyhVaGpba3dqKUlUKzQtLhwvYiJVSlc2MignOGxwY2NSZWJJaHAcLmYsMTIuMzQqJEJEVERKIDJjKWtlYmErPmNea28nKj9fbm9kYyAyZjIvKicqMikvLy4xLzQnSl1mWHBkJTJkNC8uKjMtHipVUko8ZGtwcBwxXCUyZCQuXWNlaywrMTE3ZCpgamZmIy1mUnNtUGBpZTttcm5sbWBgRF1uWGVgcl9iZGxja3kcMGExNDEvMigyNS40IDJmLzMvJzIxLTMyNiUwZS0rLzAtLzE1NzQkL10xNCszLDEzMzcwLFVtPXVIakEjMV5ZUGdtSnRzdEdsPStJVER3R3lzZ1l2XnBNYU91SldxM0dKRmZDQmZ0TXc3LURlRllfQlJlWDFSXUxEPC9JQzgvTT9udExwLmdhR0BwVmFndEBWVWxheHZ0

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get serialnumber

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 368

Network

Country Destination Domain Proto
US 8.8.8.8:53 srv.desk-top-app.info udp

Files

C:\Users\Admin\AppData\Local\Temp\nsd2DF4.tmp\dhihhg.dll

MD5 09c0a8445c727b6cdee796a9a58b5482
SHA1 e654bd7418601f7205b2632c8bf32c29295384f9
SHA256 e363e4886f4a87644efc9a2515c0a98c054f50b02fc5fb58b540e041ad0d70d3
SHA512 3a43a904ea11bc1b70580da33196073e6f3a53841342ff755845f4eff94f4009b1fd496a57b2a38f36bb9dadbb87af92ca8ab9222547d780db081dc0a6ae0b85

\Users\Admin\AppData\Local\Temp\nsd2DF4.tmp\nsisunz.dll

MD5 5f13dbc378792f23e598079fc1e4422b
SHA1 5813c05802f15930aa860b8363af2b58426c8adf
SHA256 6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA512 9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

C:\Users\Admin\AppData\Local\Temp\1430611339.exe

MD5 74cef7d7c576ac82610f035cf64948c5
SHA1 18025d461bad7e6630a840e773a1682aec84a677
SHA256 e6f064ef2c59a18106222839ca23ec68bd4dc935af65d78bd76854717598b845
SHA512 f1387c2630f212aed38f6dc825609b706cf5a467e8522985208b84b17c8d8554e386a41620a0750e2e0ff8bb4a6dcafd764773121698e38bb2c841d9e8915016

C:\Users\Admin\AppData\Local\Temp\81717290200.txt

MD5 9025468f85256136f923096b01375964
SHA1 7fcd174999661594fa5f88890ffb195e9858cc52
SHA256 d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA512 92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 01:03

Reported

2024-06-02 01:05

Platform

win10v2004-20240426-en

Max time kernel

134s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1180 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 1180 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 1180 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1430611339.exe
PID 536 wrote to memory of 4272 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4272 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4272 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4488 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4488 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4488 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4884 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4884 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 4884 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 3228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 3228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 3228 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 536 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\1430611339.exe C:\Windows\SysWOW64\Wbem\wmic.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8c66a81919e6a85068e0f83059323d5a_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\1430611339.exe

C:\Users\Admin\AppData\Local\Temp\1430611339.exe 0#2#1#4#9#4#0#9#2#5#0 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

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get serialnumber

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81717290200.txt bios get version

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 536 -ip 536

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 964

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 srv.desk-top-app.info udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 15.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nsi686F.tmp\dhihhg.dll

MD5 09c0a8445c727b6cdee796a9a58b5482
SHA1 e654bd7418601f7205b2632c8bf32c29295384f9
SHA256 e363e4886f4a87644efc9a2515c0a98c054f50b02fc5fb58b540e041ad0d70d3
SHA512 3a43a904ea11bc1b70580da33196073e6f3a53841342ff755845f4eff94f4009b1fd496a57b2a38f36bb9dadbb87af92ca8ab9222547d780db081dc0a6ae0b85

C:\Users\Admin\AppData\Local\Temp\nsi686F.tmp\nsisunz.dll

MD5 5f13dbc378792f23e598079fc1e4422b
SHA1 5813c05802f15930aa860b8363af2b58426c8adf
SHA256 6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA512 9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

C:\Users\Admin\AppData\Local\Temp\1430611339.exe

MD5 74cef7d7c576ac82610f035cf64948c5
SHA1 18025d461bad7e6630a840e773a1682aec84a677
SHA256 e6f064ef2c59a18106222839ca23ec68bd4dc935af65d78bd76854717598b845
SHA512 f1387c2630f212aed38f6dc825609b706cf5a467e8522985208b84b17c8d8554e386a41620a0750e2e0ff8bb4a6dcafd764773121698e38bb2c841d9e8915016

C:\Users\Admin\AppData\Local\Temp\81717290200.txt

MD5 9025468f85256136f923096b01375964
SHA1 7fcd174999661594fa5f88890ffb195e9858cc52
SHA256 d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA512 92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

C:\Users\Admin\AppData\Local\Temp\81717290200.txt

MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA512 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

C:\Users\Admin\AppData\Local\Temp\81717290200.txt

MD5 f8e2f71e123c5a848f2a83d2a7aef11e
SHA1 5e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA256 79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA512 8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-02 01:03

Reported

2024-06-02 01:05

Platform

win7-20240221-en

Max time kernel

117s

Max time network

118s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dhihhg.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dhihhg.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dhihhg.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 220

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-02 01:03

Reported

2024-06-02 01:05

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dhihhg.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1976 wrote to memory of 1560 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1976 wrote to memory of 1560 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1976 wrote to memory of 1560 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dhihhg.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dhihhg.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1560 -ip 1560

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 600

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 107.211.222.173.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 85.65.42.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-02 01:03

Reported

2024-06-02 01:05

Platform

win7-20240221-en

Max time kernel

119s

Max time network

125s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 228

Network

N/A

Files

N/A