Analysis

  • max time kernel
    149s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 19:31

General

  • Target

    00272c2567df3790002d437d714e77bf_JaffaCakes118.exe

  • Size

    400KB

  • MD5

    00272c2567df3790002d437d714e77bf

  • SHA1

    1082a2414e25e8ea50ed8ce19f7458c4625629cd

  • SHA256

    d8b25dfd4162bda73227600f2027ff24561707f7d5e8698c6c871732f96e6d20

  • SHA512

    61b1d7188236942250d2089e79d8f769fc0b0497bdebb522146ec2a2c296dd2fe71fd8563c8dbee066cb562f15c961884cd23628b43cd73cef7a4dec914364c6

  • SSDEEP

    6144:y2V/1S85Q1WWRyohxw2anHQYk005S6uYXv42uWNJp9MdYQCcNYDnyWIQe61DE+v:51S8+QFoXQHTk0gSengPNYDnX3Dv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 24 IoCs
  • Drops file in System32 directory 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\SysWOW64\lxcvaiswj.exe
      C:\Windows\system32\lxcvaiswj.exe 1340 "C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\jibjjscpl.exe
        C:\Windows\system32\jibjjscpl.exe 1248 "C:\Windows\SysWOW64\lxcvaiswj.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\SysWOW64\layjgkvxu.exe
          C:\Windows\system32\layjgkvxu.exe 1352 "C:\Windows\SysWOW64\jibjjscpl.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Windows\SysWOW64\idpwpuoip.exe
            C:\Windows\system32\idpwpuoip.exe 1232 "C:\Windows\SysWOW64\layjgkvxu.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2540
            • C:\Windows\SysWOW64\cdmenmgry.exe
              C:\Windows\system32\cdmenmgry.exe 1264 "C:\Windows\SysWOW64\idpwpuoip.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1460
              • C:\Windows\SysWOW64\iglsvwrkb.exe
                C:\Windows\system32\iglsvwrkb.exe 1376 "C:\Windows\SysWOW64\cdmenmgry.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:2892
                • C:\Windows\SysWOW64\cgislojsc.exe
                  C:\Windows\system32\cgislojsc.exe 1384 "C:\Windows\SysWOW64\iglsvwrkb.exe"
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:912
                  • C:\Windows\SysWOW64\hjzfuzcdf.exe
                    C:\Windows\system32\hjzfuzcdf.exe 1396 "C:\Windows\SysWOW64\cgislojsc.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:2284
                    • C:\Windows\SysWOW64\bjwfsqulg.exe
                      C:\Windows\system32\bjwfsqulg.exe 1256 "C:\Windows\SysWOW64\hjzfuzcdf.exe"
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:1072
                      • C:\Windows\SysWOW64\zmvtabfei.exe
                        C:\Windows\system32\zmvtabfei.exe 1280 "C:\Windows\SysWOW64\bjwfsqulg.exe"
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:3132
                        • C:\Windows\SysWOW64\berbysfmr.exe
                          C:\Windows\system32\berbysfmr.exe 1392 "C:\Windows\SysWOW64\zmvtabfei.exe"
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:2028
                          • C:\Windows\SysWOW64\ypiohdqxu.exe
                            C:\Windows\system32\ypiohdqxu.exe 1432 "C:\Windows\SysWOW64\berbysfmr.exe"
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:4584
                            • C:\Windows\SysWOW64\bhfoxvjgv.exe
                              C:\Windows\system32\bhfoxvjgv.exe 1300 "C:\Windows\SysWOW64\ypiohdqxu.exe"
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of WriteProcessMemory
                              PID:5088
                              • C:\Windows\SysWOW64\ysecfntzy.exe
                                C:\Windows\system32\ysecfntzy.exe 1312 "C:\Windows\SysWOW64\bhfoxvjgv.exe"
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:1216
                                • C:\Windows\SysWOW64\slbkdxuhz.exe
                                  C:\Windows\system32\slbkdxuhz.exe 1284 "C:\Windows\SysWOW64\ysecfntzy.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:3612
                                  • C:\Windows\SysWOW64\ynsplpfsc.exe
                                    C:\Windows\system32\ynsplpfsc.exe 1292 "C:\Windows\SysWOW64\slbkdxuhz.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of WriteProcessMemory
                                    PID:4808
                                    • C:\Windows\SysWOW64\sopxbzxal.exe
                                      C:\Windows\system32\sopxbzxal.exe 1448 "C:\Windows\SysWOW64\ynsplpfsc.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:440
                                      • C:\Windows\SysWOW64\pqolsrqto.exe
                                        C:\Windows\system32\pqolsrqto.exe 1452 "C:\Windows\SysWOW64\sopxbzxal.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:4908
                                        • C:\Windows\SysWOW64\rrllibicp.exe
                                          C:\Windows\system32\rrllibicp.exe 1316 "C:\Windows\SysWOW64\pqolsrqto.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:4420
                                          • C:\Windows\SysWOW64\ptcyqutnr.exe
                                            C:\Windows\system32\ptcyqutnr.exe 1356 "C:\Windows\SysWOW64\rrllibicp.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:2664
                                            • C:\Windows\SysWOW64\ruzgodlvs.exe
                                              C:\Windows\system32\ruzgodlvs.exe 1500 "C:\Windows\SysWOW64\ptcyqutnr.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Suspicious use of WriteProcessMemory
                                              PID:4736
                                              • C:\Windows\SysWOW64\owylxweov.exe
                                                C:\Windows\system32\owylxweov.exe 1496 "C:\Windows\SysWOW64\ruzgodlvs.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:3576
                                                • C:\Windows\SysWOW64\ipvungxwe.exe
                                                  C:\Windows\system32\ipvungxwe.exe 1344 "C:\Windows\SysWOW64\owylxweov.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:1732
                                                  • C:\Windows\SysWOW64\ozmhdyhhh.exe
                                                    C:\Windows\system32\ozmhdyhhh.exe 1528 "C:\Windows\SysWOW64\ipvungxwe.exe"
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:920

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\lxcvaiswj.exe

          Filesize

          400KB

          MD5

          00272c2567df3790002d437d714e77bf

          SHA1

          1082a2414e25e8ea50ed8ce19f7458c4625629cd

          SHA256

          d8b25dfd4162bda73227600f2027ff24561707f7d5e8698c6c871732f96e6d20

          SHA512

          61b1d7188236942250d2089e79d8f769fc0b0497bdebb522146ec2a2c296dd2fe71fd8563c8dbee066cb562f15c961884cd23628b43cd73cef7a4dec914364c6

        • memory/440-149-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/440-139-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/912-69-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/912-58-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1072-85-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1072-75-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1216-115-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1216-125-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1460-53-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1460-43-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1964-27-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/1964-37-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2028-91-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2028-101-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2284-67-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2284-77-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2540-45-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2540-35-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2664-163-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2664-172-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2676-9-0x0000000002870000-0x0000000002960000-memory.dmp

          Filesize

          960KB

        • memory/2676-21-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2676-8-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2892-51-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/2892-61-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/3132-83-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/3132-93-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/3176-29-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/3176-19-0x0000000002890000-0x0000000002980000-memory.dmp

          Filesize

          960KB

        • memory/3176-18-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/3612-133-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/3612-123-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4420-165-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4420-155-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4584-109-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4584-99-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4616-12-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4616-0-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4616-11-0x0000000002790000-0x0000000002880000-memory.dmp

          Filesize

          960KB

        • memory/4616-1-0x0000000002790000-0x0000000002880000-memory.dmp

          Filesize

          960KB

        • memory/4808-131-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4808-141-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4908-147-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/4908-157-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/5088-117-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB

        • memory/5088-107-0x0000000000400000-0x0000000000877000-memory.dmp

          Filesize

          4.5MB