Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 07:32

General

  • Target

    251f188c303a7b31b5e55e1c870eb911_JaffaCakes118.exe

  • Size

    996KB

  • MD5

    251f188c303a7b31b5e55e1c870eb911

  • SHA1

    8a62f4d846908103cceff598d1bac86263f8bd17

  • SHA256

    f9358fc3dad20815eb001ba00fb31a392ad3c91b9a781ed8bc5aaf6ccaff6ba6

  • SHA512

    9f891dd516838aa889f8c40ca7f6309b48f14332bce1373f2cd3b17a64c7154bf8fa4ed6a3f44618110f2a9a2480199bc4d72577d7d750c8e5371ab6dacc47cd

  • SSDEEP

    24576:eawtVR5j34FQPkAX7VhAFkWIlWQmXEtRll79P:epxxBXBWIlvm0thBP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\251f188c303a7b31b5e55e1c870eb911_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\251f188c303a7b31b5e55e1c870eb911_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.BAT
        3⤵
          PID:3824
    • C:\Windows\system\systen.exe
      C:\Windows\system\systen.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        2⤵
          PID:5076

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

              Filesize

              616KB

              MD5

              aee44e6a85f2e617a26b8524d4d41f8a

              SHA1

              8b87f98e1d9b57064df9cab7e18b787e5ea0f5b0

              SHA256

              6bc78da768391c3326ab53b98629390282733595ab533eb7221a75bafabb1803

              SHA512

              5b75fadd985b811139c82bc642072557d745e2e94ecd86f4b3e82bb001898a2197c5ff153362445b22dedce3837ef09dfce1939d96e3b425b38ea10ca648c9fd

            • C:\Windows\uninstal.BAT

              Filesize

              150B

              MD5

              fe057412c9beb71bec488d402875116b

              SHA1

              266a449927e39cef7518f182e779105d3efb69bc

              SHA256

              21ebeca53b521e80edba2355daf7063eb9873be4cb013dba11538e34b011048b

              SHA512

              0ee704e1eb145c27b552b29c756d3bdee6866421e57590120eaa547cec5571ea42944f83a8d3af2f38e69c48038c94381caefd0604a49a3b3dcbe229f2cc1c87

            • memory/1500-14-0x0000000000400000-0x00000000005B3C80-memory.dmp

              Filesize

              1.7MB

            • memory/1500-13-0x00000000005A6000-0x00000000005A7000-memory.dmp

              Filesize

              4KB

            • memory/1500-10-0x0000000000400000-0x00000000005B3C80-memory.dmp

              Filesize

              1.7MB

            • memory/2168-5-0x0000000001000000-0x0000000001109000-memory.dmp

              Filesize

              1.0MB

            • memory/2168-8-0x0000000001000000-0x0000000001109000-memory.dmp

              Filesize

              1.0MB

            • memory/2168-0-0x0000000001000000-0x0000000001109000-memory.dmp

              Filesize

              1.0MB

            • memory/2168-2-0x0000000001000000-0x0000000001109000-memory.dmp

              Filesize

              1.0MB

            • memory/2168-20-0x0000000001000000-0x0000000001109000-memory.dmp

              Filesize

              1.0MB

            • memory/2168-1-0x00000000010B0000-0x00000000010B1000-memory.dmp

              Filesize

              4KB

            • memory/2280-17-0x0000000000400000-0x00000000005B3C80-memory.dmp

              Filesize

              1.7MB

            • memory/2280-22-0x0000000000400000-0x00000000005B3C80-memory.dmp

              Filesize

              1.7MB

            • memory/2280-23-0x0000000000400000-0x00000000005B3C80-memory.dmp

              Filesize

              1.7MB