Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 10:38

General

  • Target

    1afa2c9a9681c4322f51228421e39348_JaffaCakes118.exe

  • Size

    61KB

  • MD5

    1afa2c9a9681c4322f51228421e39348

  • SHA1

    09f6745fca2133bf1fdd4f7de93ca4d7b5df7f18

  • SHA256

    bc4d5681743789a40d6785979e84884667ccc938742199bff364c2f614e7229b

  • SHA512

    ba462e9437dfa4062c2dc69fbaf7bbeb21ee8a550be57e7393064c6bd229b5d5e2fd7b6ca521c537b6795dc34720e4713df1e5904a2a7136f29fa804d42d5019

  • SSDEEP

    1536:uoC2zZySAdmHtK8QZ2/e/0+8py1UItPgYYUZ:uoRzZyS9N2Z22/0u1fPgYb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1afa2c9a9681c4322f51228421e39348_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1afa2c9a9681c4322f51228421e39348_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1AFA2C~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1640-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB