Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 04:02

General

  • Target

    149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    149bd7db631fd522efa8e620b9f3d358

  • SHA1

    431316cbb279ef093e5dcf0e621faa2ada21fc9b

  • SHA256

    a86db9a973c9fb32872a5b1fe3be5590cd60b75f95ce5ccc75a87a37b924931e

  • SHA512

    e6c0c59e5b24d506184d4825cea847a55f3edc60bdf1242a4d2e9c03d8a972b1175e5c3fcc411539746dee394805ae457006d4a763786f11fef0b45b8e21e234

  • SSDEEP

    6144:mbXtAESWd8qO8GumbZ4B7MjWJ44ohbKjm0i9Z5AaNdq:mrtz8uRBMjWJ44AKjm0i9Z5Xu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spy-net.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spy-net.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spy-net.exe

    Filesize

    80KB

    MD5

    1f93856d7f1be90279d77ac83f11655e

    SHA1

    e6770a5fefd4c4c94f523ebdb7c82bd997bc3e2a

    SHA256

    b81cefb55f01eef2b6a623c3ae3b716fe245099e10dfbf9587e82be203b6283e

    SHA512

    2a6607e4b6f184766913f110e38e27cdb18089349463fc12c12eb3cd9cc3ad33358e82ff1c6133e19a5897315f3cb245774933d6030118347a1fae39d619fc8d

  • memory/216-25-0x0000000002190000-0x00000000021C2000-memory.dmp

    Filesize

    200KB

  • memory/216-21-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/216-18-0x0000000002190000-0x00000000021C2000-memory.dmp

    Filesize

    200KB

  • memory/216-17-0x0000000002190000-0x00000000021C2000-memory.dmp

    Filesize

    200KB

  • memory/216-14-0x0000000002190000-0x00000000021C2000-memory.dmp

    Filesize

    200KB

  • memory/216-12-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4816-3-0x0000000001000000-0x0000000001042000-memory.dmp

    Filesize

    264KB

  • memory/4816-8-0x0000000001000000-0x0000000001042000-memory.dmp

    Filesize

    264KB

  • memory/4816-4-0x0000000001000000-0x0000000001042000-memory.dmp

    Filesize

    264KB

  • memory/4816-7-0x0000000001000000-0x0000000001042000-memory.dmp

    Filesize

    264KB

  • memory/4816-0-0x0000000001001000-0x0000000001003000-memory.dmp

    Filesize

    8KB

  • memory/4816-2-0x0000000001000000-0x0000000001042000-memory.dmp

    Filesize

    264KB

  • memory/4816-22-0x0000000001001000-0x0000000001003000-memory.dmp

    Filesize

    8KB

  • memory/4816-1-0x0000000001000000-0x0000000001042000-memory.dmp

    Filesize

    264KB