Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 12:22

General

  • Target

    1b48f1f3bc142c653dbe57f854a7b22e_JaffaCakes118.exe

  • Size

    22KB

  • MD5

    1b48f1f3bc142c653dbe57f854a7b22e

  • SHA1

    ac1028004b0efdbf30e039bca4de8f6fd3def95d

  • SHA256

    047bd97a1f3fb151d4b5b557063bdaa9c472ad838390f531a9d0d8d56f9d6d0d

  • SHA512

    62ee122bcdb4d8c85304239f849ebea02dc03e170d4ed270cb74f491893b24cd250dbf0f7f371b6dd29675975f49c6fcf9c56454de03cf36f2e62826e6e8cd89

  • SSDEEP

    384:5I6zi9IwC5onVj5yQHCFzcf8FtC2C/xCdCRjjNOXx80UI7/UoBl1t:ZwgoVj5LcDFtC/IgJY80UofX

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b48f1f3bc142c653dbe57f854a7b22e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b48f1f3bc142c653dbe57f854a7b22e_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VGA1DFC.tmp

    Filesize

    16KB

    MD5

    f0429c9678ec1e17cc062502198a8450

    SHA1

    6652a718010f0c4e48fbf4ce801332cce0f26a45

    SHA256

    5182be83ac953fc476f443d3e02ab1ce1b507543cfbac1cdbcd1dfdeb3bb1b09

    SHA512

    ca2a81bae712da40a0abd4f28a72da4d7c54ba40576ce3e6afed08515bed6ad3cdf696595b18e1e52f577003c0a42d554dbbc7009cfe07e43a01fe6eafbfade7

  • memory/1648-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1648-10-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB