Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 10:47

General

  • Target

    1b005facaeb3280183ddf02bfcc8588a_JaffaCakes118.exe

  • Size

    730KB

  • MD5

    1b005facaeb3280183ddf02bfcc8588a

  • SHA1

    186007254ba17be7030119509979ef0c314f05dd

  • SHA256

    5c4696dece4312512cd49b0b65e081b392c5c006bd202adf046eaeb0682affb2

  • SHA512

    6e0e894b0a6f3e294ed222560dc2ded480dd38a71f54a62c9e78fc4454943d67f5b24a8845704a3561786de4a9c4d3713cae92c957910ad45b45bbbfddbc5f33

  • SSDEEP

    12288:2zxveAzCY64LyRAuYW/g8eyi49Wr3xvPTY38czsg84On0kBOvW1LcqOwi:SmeCY64LMAuYZyipk8GnwnOwi

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b005facaeb3280183ddf02bfcc8588a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b005facaeb3280183ddf02bfcc8588a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\RM Royal Media Ltd.\Romi Royal Install\install\RummyRoyal_Live_hu.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\1b005facaeb3280183ddf02bfcc8588a_JaffaCakes118.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3016
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 965231D947D0D012FCA52FB2DC1574AA C
      2⤵
      • Loads dropped DLL
      PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIFAA.tmp

    Filesize

    14KB

    MD5

    1afa5d8db46927c210ca89b7ec81e1c7

    SHA1

    e5cd5b8f8afe4faf43a64d4c16d048228b9ee2fd

    SHA256

    e55a022de86edfd958583023e9989b94751ea36322587e047c9af642d3fb82dc

    SHA512

    6e860e077149e0466b267f2300ca1eba67eaee419f1bf8cc8e7ad0542472f197407b4ca6dd60632cd731ef4780a7c389bd8dedafa7e330113ef0062f188e4b24

  • C:\Users\Admin\AppData\Roaming\RM Royal Media Ltd\Romi Royal Install\install\RummyRoyal_Live_hu.msi

    Filesize

    309KB

    MD5

    5da84727e0583cc10194a8362db7c5be

    SHA1

    0940ae296c954a1c41d05fc1ad4b6021e268c703

    SHA256

    a09a000dbbe490cdc4cc37c31e8165da9b110b26d8cde3cbe8d590232da9d13f

    SHA512

    2f88419c78702c57af259fe79f5a2f1578178e1d5b94bae65bccaad6fa4877a99be47d56af3311abd9ae016e9c4906f49d60c51d32beb0be20f7a71ce9ae2813