Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 08:31

General

  • Target

    942b292951ef2f967d1f8f865280ffdb_JaffaCakes118.exe

  • Size

    866KB

  • MD5

    942b292951ef2f967d1f8f865280ffdb

  • SHA1

    3da41fb65bcd8243eef91b6135975376badfbab2

  • SHA256

    5d5ab41fe7d312908eeed82b496b92f5982decf1efc57ab492840ca00efb0ef4

  • SHA512

    b481d4b3adff6a8b2f669da31696e4c2320186f4d92ef53641b5d184657c9f808d091dc71624711fcedb317eac5c87a60baec1ab866f92ae33d6d64ddce84ea6

  • SSDEEP

    24576:GtHz8zgzexxRtb8ZoQrQZ4p3b/sZOPxR:Qz8zhxxXb8ZlrQ2pLkeR

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\942b292951ef2f967d1f8f865280ffdb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\942b292951ef2f967d1f8f865280ffdb_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\22398\services.exe
      C:\Users\Admin\AppData\Local\Temp\22398\services.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3364
    • C:\Users\Admin\AppData\Local\Temp\22398\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\22398\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4900
    • C:\Users\Admin\AppData\Local\Temp\223982\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\223982\svchost.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2352
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3888,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:8
    1⤵
      PID:2392

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7UY3WOJS\lidudu[1].htm

            Filesize

            43KB

            MD5

            d0dc5f6c7dd51a8b7d6f0a7772964b79

            SHA1

            47f0f894c8ae5f79255289eee396cc9587d1d22e

            SHA256

            b2d11a62bf2de3964a1827c154baf7bf95a21249394b6d11151d1763fc7f5bc6

            SHA512

            b8422a7d15128503e665afc66f8971a7957058e849cac0e2d66533a5e06c7aecc8b15361065adebf740d4a9e9d9c5267bc018db4331d169b2527fe043de623d6

          • C:\Users\Admin\AppData\Local\Temp\223982\svchost.exe

            Filesize

            340KB

            MD5

            cd0b75bc3eb6ca85cacce02aea253055

            SHA1

            931dcdba1ef212021515fb31336038397fba9f64

            SHA256

            bfda9d63692f86187a3429f44d805af6ff505c7bf02cd452b3869f5f217cfff3

            SHA512

            e8d9ce763abed8c0fc004d53afb3ce907c70e201a47d21c3de725060bf7f1ade94f8384532e6f0f812b0521e22346613e0bb2019462befa5cc4117b1290fd73c

          • C:\Users\Admin\AppData\Local\Temp\22398\services.exe

            Filesize

            342KB

            MD5

            56345b57ee7f8e9efbe052a123c54131

            SHA1

            95c6dad4ae221b0d4a4ccd4d4185e052e878dbdb

            SHA256

            d8c1709c361778dd4b9318dabdcb7c1e36bfb57ecd44eae45fc8388ea99b23cb

            SHA512

            b76ff393606e78b4f383decb7c7fba801c4b1605414e9721a1d98c8a6d3238477aee9d2b146cbb443ecb22ae727baf20549e41d56def7bf9ef68ee638ed58602

          • C:\Users\Admin\AppData\Local\Temp\22398\svchost.exe

            Filesize

            176KB

            MD5

            a0a03eae129b94539e33e885ac5d1316

            SHA1

            7e5aabb819bcbda26bd0f4206ba54503e0b2e0fa

            SHA256

            ca994d295719cf147b8493fb98af6198563808a750439f230bfc910288a059c2

            SHA512

            fb80158ca870fef69305c1d4a21cd0c16c2cc93b78502c22ab70b2bec1b56ca9610c801190678f4ad19ae57d3bb8930d88b2cc6800832a8b41b75eb36f62bd43

          • memory/2352-12-0x00000000005C0000-0x00000000007CE000-memory.dmp

            Filesize

            2.1MB

          • memory/2352-28-0x00000000005C0000-0x00000000007CE000-memory.dmp

            Filesize

            2.1MB

          • memory/2352-40-0x00000000005C0000-0x00000000007CE000-memory.dmp

            Filesize

            2.1MB

          • memory/2352-41-0x00000000005C0000-0x00000000007CE000-memory.dmp

            Filesize

            2.1MB