Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 18:38

General

  • Target

    1c150c2e678c0f100c006ca2d64790dd_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    1c150c2e678c0f100c006ca2d64790dd

  • SHA1

    74d4346082a6eb758c536446b89731a18062ff92

  • SHA256

    3c2b3c4b28e726cd3f98694309ecf179914b61038458945502a9972e5eedd29c

  • SHA512

    19523cd4f33ab9f9cb84c25d35140787f4bd4f191f10d332baecf3a4934caaa35c74585a41fda645fbb986f2d677b34444378705b0ff7d269d7fc089544d689c

  • SSDEEP

    3072:oFL1odMtuKodPunLHA6P8R2I51Xfi5KWhEgHRszEvCec9GJfJ3oGnVyT:Dd1K+Pun0fHf+7EgHRszEvY9QPU

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c150c2e678c0f100c006ca2d64790dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1c150c2e678c0f100c006ca2d64790dd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Program Files\Garss.exe
      "C:\Program Files\Garss.exe" "C:\Program Files\power.ini" Main
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:1740
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\1.reg
      2⤵
      • Sets service image path in registry
      • Runs .reg file with regedit
      PID:2284
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1C150C~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\1.reg

          Filesize

          3KB

          MD5

          48d60102d14e5f2e6952123466354327

          SHA1

          a45b7c952ef48315f362b6aa103896deeee97a40

          SHA256

          ad9b04d6bc9eb91bac5a7f1d98f268d3b9a9e91ef12211564200cac2a5a8d9e3

          SHA512

          a8a444703f6dc29626f4d5120223c8a76fe961a970de92d184457923fd9e2da50bf7d56eea987fe4f0f36733c3ff227b338a4196f76a9bb9874b2608f27c6c24

        • \Program Files\Garss.exe

          Filesize

          43KB

          MD5

          51138beea3e2c21ec44d0932c71762a8

          SHA1

          8939cf35447b22dd2c6e6f443446acc1bf986d58

          SHA256

          5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

          SHA512

          794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

        • memory/1740-9-0x0000000010000000-0x0000000010022000-memory.dmp

          Filesize

          136KB