Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 23:02

General

  • Target

    23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe

  • Size

    350KB

  • MD5

    23c493ab28e1bdb0502fb1533ebbb3a7

  • SHA1

    51d84fa61b3ec7fecce693b8d7d665ffe2578178

  • SHA256

    a760e30220f02f3a75a638403433a35c38d59cf8ffc4d3beb6fccc94974c0f4d

  • SHA512

    b7e3e4fa61800eceb6acafaec5b69704b0998074a471e8123f210fb2aa64a0a9cfd9ca9c931adeea2e735ebc891ab5ee9951434184055b0d0ad024f7951fb9a3

  • SSDEEP

    6144:lR6VWA3ZOEBlhuj1KAtaFnY0MIq0rJjQ+IG3unvrlJcsS7VZI9d9hyjr:/6VWNcxFYxIq2ZIK+vrlJcd77n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23c493ab28e1bdb0502fb1533ebbb3a7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
        PID:772
    • C:\Windows\G_Server.exe
      C:\Windows\G_Server.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:4860

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ACJHKW.TMP

        Filesize

        65KB

        MD5

        13f1364c10aaaa09a4f66059c2c8f859

        SHA1

        a05a28eba992e2e15e6b7184b48ba5017a3e4e32

        SHA256

        d9fc7f19c1204e634de4c44cf8bc78eb7bbc879c5c2b64649c72aa48c60fc436

        SHA512

        1f0da83575993d4f7036a474a2ec1b5e2a676225782d6c234515e732f7113cf72f600a2de3286f80e2a7ced4f6f9f71ba4f52f5380534891793112a93d635d3d

      • C:\Users\Admin\AppData\Local\Temp\COGLLF.TMP

        Filesize

        33KB

        MD5

        884d60a1209c2c16046d4e4c8f481698

        SHA1

        3bdaa577777cd70b744492010da99d74cc34e549

        SHA256

        5b1b9e753974893937869b01b3373ed34f5e8e1e046d909d33fa4756428c92e7

        SHA512

        edb70444ca24124012d4860d552e4eaa656f7cac81cf7e512ec8dacee0a97c883feaba65bdbab1792e294413bcf0c800a8b69fe7b62bb398f383815a576bd4e1

      • C:\Users\Admin\AppData\Local\Temp\UYIXWK.TMP

        Filesize

        17KB

        MD5

        55bca483834624d9d1235ba3ac43d8fd

        SHA1

        c3eb3baaa9863583f38cc7fce67e1914c1bd710f

        SHA256

        897c541e061f6c9a120ba8c711f2d7b96e1b588d70528412bdea9761fb02ceed

        SHA512

        e9aaeab71538d5782f3ec8c2ebea1ae8e8cd2e1a7986e26e62a448413a027e1bc5fcba92f93acb73b8555bf16c85c5631477367f9a90c55243a5a8e238deb8df

      • C:\Windows\G_Server.exe

        Filesize

        350KB

        MD5

        23c493ab28e1bdb0502fb1533ebbb3a7

        SHA1

        51d84fa61b3ec7fecce693b8d7d665ffe2578178

        SHA256

        a760e30220f02f3a75a638403433a35c38d59cf8ffc4d3beb6fccc94974c0f4d

        SHA512

        b7e3e4fa61800eceb6acafaec5b69704b0998074a471e8123f210fb2aa64a0a9cfd9ca9c931adeea2e735ebc891ab5ee9951434184055b0d0ad024f7951fb9a3

      • C:\Windows\uninstal.bat

        Filesize

        218B

        MD5

        46d40c1b130d9560ddb84cd2abcd8a14

        SHA1

        915672abdb6326694cab40fd46d1c3916f5c2ca9

        SHA256

        02a0a0ea1d4b61414ce445a0f39db55491e9252ef718ad67df9c6b824506a373

        SHA512

        edd0856aed9538b612cef31de6253f137af98d76570902e0a17c08815e369bb5e58ea7b2963569428dcb10d2a86d57a0fb1cce454e8d474d7f1c4cb503bbdd52

      • memory/1104-1-0x0000000000700000-0x0000000000701000-memory.dmp

        Filesize

        4KB

      • memory/1104-0-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/1104-31-0x00000000023C0000-0x00000000023CE000-memory.dmp

        Filesize

        56KB

      • memory/1104-34-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/1104-32-0x00000000023D0000-0x00000000023E5000-memory.dmp

        Filesize

        84KB

      • memory/1104-33-0x00000000023F0000-0x0000000002416000-memory.dmp

        Filesize

        152KB

      • memory/2132-27-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2132-28-0x0000000000680000-0x0000000000681000-memory.dmp

        Filesize

        4KB

      • memory/2132-29-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB