Analysis

  • max time kernel
    1s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 00:58

General

  • Target

    99ab60c0c7bc416aa44a204e0239c557_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    99ab60c0c7bc416aa44a204e0239c557

  • SHA1

    ebd8cebc0031e57a30b097d4760704fd206ef8de

  • SHA256

    11003836dc7872b1f03bf436e0af676714fedcbb862a911a49fde6cc8d2e1cd6

  • SHA512

    c00bf6a5a6e0363635a860645a187d86111bf2952e864eedb66154a3d807765d376c38fecec86a78b9e5ac8880b45ee12c8a25695f36a5f9ce55bd60f75332c2

  • SSDEEP

    24576:ZbSaE4mvt/wFqZGwLvEVPzSgGH8TMrfsww+I:ZbSv4mvqOjEVbiDa

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99ab60c0c7bc416aa44a204e0239c557_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\99ab60c0c7bc416aa44a204e0239c557_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:552
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
        PID:5016
        • C:\Users\Admin\AppData\Local\Temp\efcabfigdd.exe
          C:\Users\Admin\AppData\Local\Temp\efcabfigdd.exe 5-6-1-4-3-2-2-4-8-3-7 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
          3⤵
            PID:3952
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81717635538.txt bios get serialnumber
              4⤵
                PID:1676
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                wmic /output:C:\Users\Admin\AppData\Local\Temp\81717635538.txt bios get version
                4⤵
                  PID:4512
                • C:\Windows\SysWOW64\Wbem\wmic.exe
                  wmic /output:C:\Users\Admin\AppData\Local\Temp\81717635538.txt bios get version
                  4⤵
                    PID:2648
                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81717635538.txt bios get version
                    4⤵
                      PID:3368
                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                      wmic /output:C:\Users\Admin\AppData\Local\Temp\81717635538.txt bios get version
                      4⤵
                        PID:3340
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 952
                        4⤵
                        • Program crash
                        PID:1148
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3952 -ip 3952
                  1⤵
                    PID:1836

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\81717635538.txt

                          Filesize

                          66B

                          MD5

                          9025468f85256136f923096b01375964

                          SHA1

                          7fcd174999661594fa5f88890ffb195e9858cc52

                          SHA256

                          d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                          SHA512

                          92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

                        • C:\Users\Admin\AppData\Local\Temp\81717635538.txt

                          Filesize

                          2B

                          MD5

                          f3b25701fe362ec84616a93a45ce9998

                          SHA1

                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                          SHA256

                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                          SHA512

                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                        • C:\Users\Admin\AppData\Local\Temp\81717635538.txt

                          Filesize

                          58B

                          MD5

                          f8e2f71e123c5a848f2a83d2a7aef11e

                          SHA1

                          5e7a9a2937fa4f06fdf3e33d7def7de431c159b4

                          SHA256

                          79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121

                          SHA512

                          8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

                        • C:\Users\Admin\AppData\Local\Temp\File.exe

                          Filesize

                          558KB

                          MD5

                          7cd7c49a0adff39b460ef7decc2a9534

                          SHA1

                          1f1ec2737204f32425b39a053e3770d8fc5774b5

                          SHA256

                          f1db7b607cc57f9a9815740d3b94a8b539142647549c93b5e238abf21e5e1040

                          SHA512

                          6866b86266a21394ab94556b08c102ae0c36133cbb40b2cbe574f3b59e8380311e0d0b8f98d7fe7768ebcb5a9f1cd468cc49914fa46febc1968f712a1c69d73b

                        • C:\Users\Admin\AppData\Local\Temp\efcabfigdd.exe

                          Filesize

                          765KB

                          MD5

                          c86f2ae14746395a46b0dade75673a66

                          SHA1

                          2363e91b02fe1c731b2154a3ec5952146e1f99af

                          SHA256

                          d49f9595b16c9d6c32367204a454b458cd4d97a95fcb06db4184854c4c3ba3a9

                          SHA512

                          c6dde013f5549ed6f98c35b3edd6613169d4271c07f0fe720ce359e0a2e709a7d1d4dddcdc3e60e72b398011cdb87c1747b1da50a851e3302058aebaa4a7b5ca

                        • C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\nsisunz.dll

                          Filesize

                          40KB

                          MD5

                          5f13dbc378792f23e598079fc1e4422b

                          SHA1

                          5813c05802f15930aa860b8363af2b58426c8adf

                          SHA256

                          6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                          SHA512

                          9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

                        • C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\trxds.dll

                          Filesize

                          125KB

                          MD5

                          696967e0667c94fc79ac87701e2bce31

                          SHA1

                          349e1ad85d794b5f8031d98a0fed1a89724cbeda

                          SHA256

                          20f4816109ffad19f2164425fffcb7e6b10ac6ebda8bb034984ef7d8f0b9fc90

                          SHA512

                          8f8b2f3dfc47351e398dbf84af165d13b345e3adcbf8220db67ba13eb281bc1d3b459225049e8dfe16c6b2c1f66e162c681080dd4ba663b27cd17d8174a284b9

                        • memory/552-0-0x00007FFD428B5000-0x00007FFD428B6000-memory.dmp

                          Filesize

                          4KB

                        • memory/552-1-0x00007FFD42600000-0x00007FFD42FA1000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/552-2-0x00007FFD42600000-0x00007FFD42FA1000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/552-18-0x000000001CC20000-0x000000001CC98000-memory.dmp

                          Filesize

                          480KB

                        • memory/552-94-0x00007FFD42600000-0x00007FFD42FA1000-memory.dmp

                          Filesize

                          9.6MB