Analysis

  • max time kernel
    143s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 04:20

General

  • Target

    02c23f945a76a845d222485aef57d008_JaffaCakes118.exe

  • Size

    581KB

  • MD5

    02c23f945a76a845d222485aef57d008

  • SHA1

    08052bcd57bb03c5306ef317761d47f5a3a7f929

  • SHA256

    c0116fda37624ac2760727035e28cf3d44b63f23e0149fde42f1fd9a35ac2db3

  • SHA512

    84cd0656551743cc39ce39b727334794c74ffc0e61f0140b84fedee1ca7f59b5afa3b44483ffbefe3da1a9260bf6c1024f8ef43fa3b057f6b78c420aa67c2419

  • SSDEEP

    6144:dLMhja1IbEDFRwmO7IYkG2FHba4/oaqa+vKZ3fsJnusCCP1cMpp/66TKBIFGrkQD:Aa1Ib4FR3O785X0JnVc+9S0acnGTG3I

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c23f945a76a845d222485aef57d008_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\02c23f945a76a845d222485aef57d008_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\7267.bat
      2⤵
      • Deletes itself
      PID:3064
  • C:\Windows\RemoteAbc.exe
    C:\Windows\RemoteAbc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2888

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7267.bat

          Filesize

          226B

          MD5

          4d239ebe1ad951ed47c4fd059969eab3

          SHA1

          59cadc0d3f521f3f49120523fe9c6dd5a8482d16

          SHA256

          bd515c8df3a7dcda358f7f1e0ea912fd1ae8af9bcf134a1a981c2715c091835c

          SHA512

          0bf94e8041c59222bb1e644320251cc00c991b3f66f000e61aad1c891e211e53df85839ad401e99be208c3f7b14103a6f4bbccb7961b0c00f86f9450dc538561

        • C:\Windows\RemoteAbc.exe

          Filesize

          581KB

          MD5

          02c23f945a76a845d222485aef57d008

          SHA1

          08052bcd57bb03c5306ef317761d47f5a3a7f929

          SHA256

          c0116fda37624ac2760727035e28cf3d44b63f23e0149fde42f1fd9a35ac2db3

          SHA512

          84cd0656551743cc39ce39b727334794c74ffc0e61f0140b84fedee1ca7f59b5afa3b44483ffbefe3da1a9260bf6c1024f8ef43fa3b057f6b78c420aa67c2419

        • memory/2148-2-0x0000000000330000-0x0000000000331000-memory.dmp

          Filesize

          4KB

        • memory/2148-13-0x0000000000400000-0x000000000049A016-memory.dmp

          Filesize

          616KB

        • memory/2888-5-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2888-16-0x0000000000400000-0x000000000049A016-memory.dmp

          Filesize

          616KB

        • memory/2888-18-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2888-20-0x0000000000400000-0x000000000049A016-memory.dmp

          Filesize

          616KB

        • memory/2888-24-0x0000000000400000-0x000000000049A016-memory.dmp

          Filesize

          616KB

        • memory/2888-28-0x0000000000400000-0x000000000049A016-memory.dmp

          Filesize

          616KB