Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 05:33

General

  • Target

    034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe

  • Size

    445KB

  • MD5

    034147d1a3607499ee9c0693c0148fb9

  • SHA1

    1f9a645ad9276257dba97c7051794c20f2cfbd47

  • SHA256

    ab4879d295dd56ac2e685a280ff70cf2c5831e7ccf63d2a8023df3bf7c9c6753

  • SHA512

    cd3b482ca10b771833ead696e28b28281857b02a3728783af3f2b4a491a74ac86547bfb1e6cf85f9764fe2ea7958afb872df6fb96a730065e6e966527d8c6dfb

  • SSDEEP

    6144:FiQmLudnQqoZSTipK1PRO8K4sJGDzCWDRHzSo04w98gWNlPTGQQm6agrd:cQBdnQqoGi81JSmzhlmo9NtTird

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 516
      2⤵
      • Program crash
      PID:3712
    • C:\Windows\sc.exe
      C:\Windows\sc.exe
      2⤵
      • Executes dropped EXE
      • Launches sc.exe
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 516
        3⤵
        • Program crash
        PID:5108
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
          PID:4152
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT
        2⤵
          PID:4428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2524 -ip 2524
        1⤵
          PID:3708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1468 -ip 1468
          1⤵
            PID:2264

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\GUOCYOKl.BAT

            Filesize

            218B

            MD5

            9e576f20f04bbfb8c384c351b80f08d0

            SHA1

            a5504c8de2d15470153900c26acc870bcfed7e0d

            SHA256

            4e95d1ff0cb7654ccc097e7faae22f15dda9afd9ef778fb03a35c674176fbd4d

            SHA512

            7421cb2dce44f05943cf22587214837d0e77e4ca417591dfda528bca12f86bc27d22dd3a95f3dadabbd3950c1ba1d1ce3241c6881a63facec2369874e79160d9

          • C:\Windows\sc.exe

            Filesize

            445KB

            MD5

            034147d1a3607499ee9c0693c0148fb9

            SHA1

            1f9a645ad9276257dba97c7051794c20f2cfbd47

            SHA256

            ab4879d295dd56ac2e685a280ff70cf2c5831e7ccf63d2a8023df3bf7c9c6753

            SHA512

            cd3b482ca10b771833ead696e28b28281857b02a3728783af3f2b4a491a74ac86547bfb1e6cf85f9764fe2ea7958afb872df6fb96a730065e6e966527d8c6dfb

          • memory/1468-14-0x0000000000400000-0x00000000004EA000-memory.dmp

            Filesize

            936KB

          • memory/1468-15-0x00000000021B0000-0x00000000021F3000-memory.dmp

            Filesize

            268KB

          • memory/1468-25-0x0000000002620000-0x0000000002621000-memory.dmp

            Filesize

            4KB

          • memory/1468-24-0x0000000000400000-0x00000000004EA000-memory.dmp

            Filesize

            936KB

          • memory/1468-23-0x00000000021B0000-0x00000000021F3000-memory.dmp

            Filesize

            268KB

          • memory/1468-22-0x0000000000400000-0x00000000004EA000-memory.dmp

            Filesize

            936KB

          • memory/1468-16-0x0000000002620000-0x0000000002621000-memory.dmp

            Filesize

            4KB

          • memory/2524-2-0x0000000002480000-0x0000000002481000-memory.dmp

            Filesize

            4KB

          • memory/2524-0-0x0000000000400000-0x00000000004EA000-memory.dmp

            Filesize

            936KB

          • memory/2524-7-0x00000000024D0000-0x00000000024D1000-memory.dmp

            Filesize

            4KB

          • memory/2524-10-0x0000000002720000-0x0000000002721000-memory.dmp

            Filesize

            4KB

          • memory/2524-19-0x0000000000400000-0x00000000004EA000-memory.dmp

            Filesize

            936KB

          • memory/2524-20-0x00000000022A0000-0x00000000022E3000-memory.dmp

            Filesize

            268KB

          • memory/2524-1-0x00000000022A0000-0x00000000022E3000-memory.dmp

            Filesize

            268KB

          • memory/2524-6-0x00000000024A0000-0x00000000024A1000-memory.dmp

            Filesize

            4KB

          • memory/2524-3-0x0000000000600000-0x0000000000601000-memory.dmp

            Filesize

            4KB

          • memory/2524-4-0x00000000005E0000-0x00000000005E1000-memory.dmp

            Filesize

            4KB

          • memory/2524-5-0x0000000002460000-0x0000000002461000-memory.dmp

            Filesize

            4KB