Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 23:24

General

  • Target

    269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    269d9f6ac6b946701cf600ea0d2f73d6

  • SHA1

    0ced0963eec39151c0f0ee0b9b2bf5bf16d5abfe

  • SHA256

    0038c749e3133c091063b6ed03ca93d9576a45e90a9def410c05c11be6eb8718

  • SHA512

    19986a042b1bb797052d3cdc92d1f56aef5855333f07a2e9f85aa63693c420c5154071c9efcd7ba0a492807f671aa50abe8c8f9b08eda380d489a9332e27c2e5

  • SSDEEP

    24576:P1S5ytTKkCBuS0JRWFVbp/4cwqAXagbzwM36:P19tfCBu3JRWF3/4egPN6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\269d9f6ac6b946701cf600ea0d2f73d6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i C:\Users\Admin\AppData\Local\Temp\MSI1130.tmp
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2432
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1CA0DD4D1BD6180E59DF15A571F33285 C
      2⤵
      • Loads dropped DLL
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI1130.tmp

    Filesize

    990KB

    MD5

    f01c3aef3d24e7353998210e871a21d6

    SHA1

    679fef77e0e2e62a5ccb1dc7fd8cf25506230fee

    SHA256

    d3ce39f0750052008e4a482d0355d7063800d72e5d287fe18033cad024822928

    SHA512

    b711251d5fb2b38ace8b9c189d60d7adf20b9467feef6230d22f8d084f5bda4c004900b10c19035ad5654862b62898fe75113372b21dbb80030169bf5f27a29f

  • C:\Users\Admin\AppData\Local\Temp\MSI12B6.tmp

    Filesize

    209KB

    MD5

    f6a25d999d9d84f6675e1756da57f3f0

    SHA1

    1a33d32feb96730824996b59d5ba38446ae5d609

    SHA256

    21100a197e3674e9f68a5dd92ed14a15c1b86611bf7003021cb35beaacf23032

    SHA512

    b2fa4013eecd0747e6f7575058140e95a0755030b58156c9c3246cddb62ff141342872b900ba01e4b2551a6f495f414410dc24ff32ed2e7109c21f038a9dbfa0