Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 18:38

General

  • Target

    1c150c2e678c0f100c006ca2d64790dd_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    1c150c2e678c0f100c006ca2d64790dd

  • SHA1

    74d4346082a6eb758c536446b89731a18062ff92

  • SHA256

    3c2b3c4b28e726cd3f98694309ecf179914b61038458945502a9972e5eedd29c

  • SHA512

    19523cd4f33ab9f9cb84c25d35140787f4bd4f191f10d332baecf3a4934caaa35c74585a41fda645fbb986f2d677b34444378705b0ff7d269d7fc089544d689c

  • SSDEEP

    3072:oFL1odMtuKodPunLHA6P8R2I51Xfi5KWhEgHRszEvCec9GJfJ3oGnVyT:Dd1K+Pun0fHf+7EgHRszEvY9QPU

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c150c2e678c0f100c006ca2d64790dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1c150c2e678c0f100c006ca2d64790dd_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Program Files\Garss.exe
      "C:\Program Files\Garss.exe" "C:\Program Files\power.ini" Main
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:432
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\1.reg
      2⤵
      • Sets service image path in registry
      • Runs .reg file with regedit
      PID:4068
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1C150C~1.EXE > nul
      2⤵
        PID:2276
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4264,i,5229431749694857451,16836185654682871752,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:8
      1⤵
        PID:3008

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\1.reg

              Filesize

              3KB

              MD5

              48d60102d14e5f2e6952123466354327

              SHA1

              a45b7c952ef48315f362b6aa103896deeee97a40

              SHA256

              ad9b04d6bc9eb91bac5a7f1d98f268d3b9a9e91ef12211564200cac2a5a8d9e3

              SHA512

              a8a444703f6dc29626f4d5120223c8a76fe961a970de92d184457923fd9e2da50bf7d56eea987fe4f0f36733c3ff227b338a4196f76a9bb9874b2608f27c6c24

            • C:\Program Files\Garss.exe

              Filesize

              60KB

              MD5

              889b99c52a60dd49227c5e485a016679

              SHA1

              8fa889e456aa646a4d0a4349977430ce5fa5e2d7

              SHA256

              6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

              SHA512

              08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

            • memory/432-7-0x0000000010000000-0x0000000010022000-memory.dmp

              Filesize

              136KB