Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 12:53

General

  • Target

    0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe

  • Size

    649KB

  • MD5

    0e26b96fa6534c030f286dbc995e1832

  • SHA1

    cf23316486e4ea5afc34d4b5bed3dc88c4d6d680

  • SHA256

    97bf8c6b7f3cc3da5e7c8b60813aa20f0d7c1e51c8a2d16f23646c33260c2afb

  • SHA512

    a1737ff50e46c5b1cb9459195b24e370416648128cc657c359757ba23be0cb1c8275660c38dad4584ec9c70e72e69ffcab9d59800339e525a3f5ebf754c43030

  • SSDEEP

    12288:PvczV7Y5S0b9fFh2RRYAv2N59+kQDSpV3sjZajCN9unzaicTEkk:P0xDO9fuMAe+GpV3sFacDiKk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e26b96fa6534c030f286dbc995e1832_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4108
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:3192

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      649KB

      MD5

      0e26b96fa6534c030f286dbc995e1832

      SHA1

      cf23316486e4ea5afc34d4b5bed3dc88c4d6d680

      SHA256

      97bf8c6b7f3cc3da5e7c8b60813aa20f0d7c1e51c8a2d16f23646c33260c2afb

      SHA512

      a1737ff50e46c5b1cb9459195b24e370416648128cc657c359757ba23be0cb1c8275660c38dad4584ec9c70e72e69ffcab9d59800339e525a3f5ebf754c43030

    • memory/4108-9-0x00000000026A0000-0x00000000026A1000-memory.dmp

      Filesize

      4KB

    • memory/4108-15-0x0000000003670000-0x0000000003671000-memory.dmp

      Filesize

      4KB

    • memory/4108-14-0x0000000003720000-0x0000000003721000-memory.dmp

      Filesize

      4KB

    • memory/4108-13-0x0000000003620000-0x0000000003623000-memory.dmp

      Filesize

      12KB

    • memory/4108-12-0x0000000003630000-0x0000000003631000-memory.dmp

      Filesize

      4KB

    • memory/4108-18-0x0000000003640000-0x0000000003641000-memory.dmp

      Filesize

      4KB

    • memory/4108-17-0x0000000000870000-0x0000000000871000-memory.dmp

      Filesize

      4KB

    • memory/4108-8-0x00000000026B0000-0x00000000026B1000-memory.dmp

      Filesize

      4KB

    • memory/4108-0-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/4108-11-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

      Filesize

      4KB

    • memory/4108-2-0x0000000000CE0000-0x0000000000D34000-memory.dmp

      Filesize

      336KB

    • memory/4108-10-0x00000000026D0000-0x00000000026D1000-memory.dmp

      Filesize

      4KB

    • memory/4108-16-0x0000000000860000-0x0000000000861000-memory.dmp

      Filesize

      4KB

    • memory/4108-7-0x0000000000D80000-0x0000000000D81000-memory.dmp

      Filesize

      4KB

    • memory/4108-6-0x0000000000D90000-0x0000000000D91000-memory.dmp

      Filesize

      4KB

    • memory/4108-5-0x00000000026C0000-0x00000000026C1000-memory.dmp

      Filesize

      4KB

    • memory/4108-4-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

      Filesize

      4KB

    • memory/4108-3-0x0000000002690000-0x0000000002691000-memory.dmp

      Filesize

      4KB

    • memory/4108-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/4108-24-0x0000000000CE0000-0x0000000000D34000-memory.dmp

      Filesize

      336KB

    • memory/4108-25-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/4784-23-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/4784-26-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB