Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 08:59

General

  • Target

    1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118.exe

  • Size

    11KB

  • MD5

    1568fd7abb74fdc3ddfeddafdb1718d7

  • SHA1

    a5e88d5fea33b6c9671defe70f96fa8be5b8e5a4

  • SHA256

    8c8326b81b34e2f497af391d332e2f6994b807b3ff7c6bccdb728e976d2a8485

  • SHA512

    6fbc19c649c5d27a82d669061369d4a9f92bc26287dfe6d5795a7ef7aed04cd9fba8d661ed0784778ddd3e84887302f6923f7ca5fd878a28ec93a22b964d693f

  • SSDEEP

    192:DYR+wsLmf9VfgnkYWCoIne80kotFfBnVPJ0Y3jbBUdb1e65:E6irfgkYfX0t93B13jbBUdbb

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\caotxbk.exe
      C:\Windows\system32\caotxbk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:3196
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118.exe.bat
      2⤵
        PID:1932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118.exe.bat

      Filesize

      210B

      MD5

      2e591af8d1274b6d92aea80ebcc881a1

      SHA1

      a4b9727ee2c8c56f9a55fb5d7b6df518150296ff

      SHA256

      71996897835f1e4dad00c575de31a52ed489d06ab6f48e065a08d350224d3632

      SHA512

      6ff8b6626bd1470788d23de5a17b33f8b325ff67e6e6f720a190f71f53748ca124163de3366dbb0dd167a10ccc2eeca2504b0a13993250e4147b42633f2701fc

    • C:\Windows\SysWOW64\caotxbk.exe

      Filesize

      11KB

      MD5

      1568fd7abb74fdc3ddfeddafdb1718d7

      SHA1

      a5e88d5fea33b6c9671defe70f96fa8be5b8e5a4

      SHA256

      8c8326b81b34e2f497af391d332e2f6994b807b3ff7c6bccdb728e976d2a8485

      SHA512

      6fbc19c649c5d27a82d669061369d4a9f92bc26287dfe6d5795a7ef7aed04cd9fba8d661ed0784778ddd3e84887302f6923f7ca5fd878a28ec93a22b964d693f

    • memory/2944-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2944-7-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3196-6-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB