Malware Analysis Report

2025-04-14 03:46

Sample ID 240612-xgz6lszbrp
Target a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118
SHA256 047839ebfda4cfbdc0579d53f5bbde9ba2e67e15e1cb0f602902605a2149b229
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

047839ebfda4cfbdc0579d53f5bbde9ba2e67e15e1cb0f602902605a2149b229

Threat Level: Shows suspicious behavior

The file a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Executes dropped EXE

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Program crash

NSIS installer

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-12 18:50

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 18:50

Reported

2024-06-12 18:52

Platform

win7-20240221-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 756 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 756 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 756 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 756 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 2164 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2164 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\WerFault.exe
PID 2164 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\WerFault.exe
PID 2164 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\WerFault.exe
PID 2164 wrote to memory of 1520 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\1432144882.exe

C:\Users\Admin\AppData\Local\Temp\1432144882.exe 1]3]2]6]7]1]3]9]6]6]1 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

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218217.txt bios get serialnumber

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218217.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218217.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218217.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218217.txt bios get version

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 368

Network

Country Destination Domain Proto
US 8.8.8.8:53 srv.desk-top-app.info udp

Files

C:\Users\Admin\AppData\Local\Temp\nso1F45.tmp\frxdwew.dll

MD5 c2bc7115e45cd13205ae5537c9d85947
SHA1 06ba255cac7dd364160923898c0087e966e63505
SHA256 8f8722ed438b81ae932e3815fe3287e35fe275d75cd9ca693509f980f9fd49ae
SHA512 7962d572a3ace8d2aa7a336669e442b8ae0497df4c15bcca01b72391299712885263f18d8ca4099ee4b5dfd233977f0fb3d1565261e6a25652d5f9e8e8d7cde2

\Users\Admin\AppData\Local\Temp\nso1F45.tmp\nsisunz.dll

MD5 5f13dbc378792f23e598079fc1e4422b
SHA1 5813c05802f15930aa860b8363af2b58426c8adf
SHA256 6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA512 9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

\Users\Admin\AppData\Local\Temp\1432144882.exe

MD5 e1dc78720925b749c349c4ad2978dc13
SHA1 623c0cf54509de1dd57ad89c48ad1dc664dac522
SHA256 a27ad6fe73094c837cb4a4b78c1d49fd31eac69ec41db800cc7f64d911f546d4
SHA512 9b2e46ebb374f33a0851bec83542021d54483bdc8233e9ed734b9a416939cae263fb2c84995eccfda825d6ad1c487ac0fa18ee432d546ea01093be01dd1ab3e4

C:\Users\Admin\AppData\Local\Temp\81718218217.txt

MD5 9025468f85256136f923096b01375964
SHA1 7fcd174999661594fa5f88890ffb195e9858cc52
SHA256 d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA512 92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 18:50

Reported

2024-06-12 18:52

Platform

win10v2004-20240611-en

Max time kernel

93s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2908 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 2908 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 2908 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1432144882.exe
PID 4296 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 5912 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 5912 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 5912 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 3924 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 3924 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 3924 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 4296 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\1432144882.exe C:\Windows\SysWOW64\Wbem\wmic.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a1d4b9d7934bf2ba046ee217d591133c_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\1432144882.exe

C:\Users\Admin\AppData\Local\Temp\1432144882.exe 1]3]2]6]7]1]3]9]6]6]1 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

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218218.txt bios get serialnumber

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218218.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218218.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218218.txt bios get version

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic /output:C:\Users\Admin\AppData\Local\Temp\81718218218.txt bios get version

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4296 -ip 4296

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 908

Network

Country Destination Domain Proto
US 8.8.8.8:53 srv.desk-top-app.info udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 219.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nso37E9.tmp\frxdwew.dll

MD5 c2bc7115e45cd13205ae5537c9d85947
SHA1 06ba255cac7dd364160923898c0087e966e63505
SHA256 8f8722ed438b81ae932e3815fe3287e35fe275d75cd9ca693509f980f9fd49ae
SHA512 7962d572a3ace8d2aa7a336669e442b8ae0497df4c15bcca01b72391299712885263f18d8ca4099ee4b5dfd233977f0fb3d1565261e6a25652d5f9e8e8d7cde2

C:\Users\Admin\AppData\Local\Temp\nso37E9.tmp\nsisunz.dll

MD5 5f13dbc378792f23e598079fc1e4422b
SHA1 5813c05802f15930aa860b8363af2b58426c8adf
SHA256 6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA512 9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

C:\Users\Admin\AppData\Local\Temp\1432144882.exe

MD5 e1dc78720925b749c349c4ad2978dc13
SHA1 623c0cf54509de1dd57ad89c48ad1dc664dac522
SHA256 a27ad6fe73094c837cb4a4b78c1d49fd31eac69ec41db800cc7f64d911f546d4
SHA512 9b2e46ebb374f33a0851bec83542021d54483bdc8233e9ed734b9a416939cae263fb2c84995eccfda825d6ad1c487ac0fa18ee432d546ea01093be01dd1ab3e4

C:\Users\Admin\AppData\Local\Temp\81718218218.txt

MD5 9025468f85256136f923096b01375964
SHA1 7fcd174999661594fa5f88890ffb195e9858cc52
SHA256 d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA512 92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

C:\Users\Admin\AppData\Local\Temp\81718218218.txt

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\81718218218.txt

MD5 f8e2f71e123c5a848f2a83d2a7aef11e
SHA1 5e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA256 79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA512 8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-12 18:50

Reported

2024-06-12 18:52

Platform

win7-20240221-en

Max time kernel

122s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frxdwew.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frxdwew.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frxdwew.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 220

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-12 18:50

Reported

2024-06-12 18:52

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frxdwew.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3148 wrote to memory of 3776 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3148 wrote to memory of 3776 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3148 wrote to memory of 3776 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frxdwew.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frxdwew.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3776 -ip 3776

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 600

Network

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-12 18:50

Reported

2024-06-12 18:52

Platform

win7-20240611-en

Max time kernel

119s

Max time network

123s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 228

Network

N/A

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-12 18:50

Reported

2024-06-12 18:52

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

53s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4188 wrote to memory of 4544 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4188 wrote to memory of 4544 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4188 wrote to memory of 4544 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4544 -ip 4544

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 600

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A