Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 21:50

General

  • Target

    17a8208667e746f100921b9d45c264c9_JaffaCakes118.exe

  • Size

    229KB

  • MD5

    17a8208667e746f100921b9d45c264c9

  • SHA1

    135a08bb0b340a170f426f623296c0fec969169e

  • SHA256

    1930a2efe2ab477ad2e503766ae4fbf0b15fc1fe2b76316de1b9f32793715707

  • SHA512

    2281b01c93f1823ffc5d578fff20b6a9e41bb4dd51f9bdba8620a7f0b1988305b0b74243fc2d0329ad1eaa28a590a2c6c304271731a688a520556e77d75293e5

  • SSDEEP

    3072:ebHHjm3P7BkOWWLvmxJny8HxhC2bl1DsyOrExy:ebHjCkeLvH8pbl1Yy

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\17a8208667e746f100921b9d45c264c9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\17a8208667e746f100921b9d45c264c9_JaffaCakes118.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3532
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:4420
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1020
            3⤵
            • Program crash
            PID:3532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1020
            3⤵
            • Program crash
            PID:4292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4736 -ip 4736
        1⤵
          PID:1724
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4432,i,6522675234395427298,2952738987384583032,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:8
          1⤵
            PID:5076
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4736 -ip 4736
            1⤵
              PID:1636

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • F:\$RECYCLE.BIN\S-1-5-21-3665033694-1447845302-680750983-1000\_desktop.ini

              Filesize

              9B

              MD5

              7d17b811a66f09661920bf5af1f95ae9

              SHA1

              f974fb71f0c9242357d308243f16d5509a0fb040

              SHA256

              1ffbf32a83283a76202c268eb3ea579c4b39aa6fb11fc42ad18318286fbf749c

              SHA512

              019689bb28dd360a9b3fe6696944854f806ebe877734f4f8533f7c2508d371049a96f6c7bd5dda908ab91686dbfba4a54335cbc6c4d649775e62912f0af730e3

            • memory/4736-0-0x0000000000400000-0x000000000043C000-memory.dmp

              Filesize

              240KB

            • memory/4736-4093-0x0000000000400000-0x000000000043C000-memory.dmp

              Filesize

              240KB