Analysis

  • max time kernel
    146s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 05:31

General

  • Target

    276808deb414c644073593b8d29d886a_JaffaCakes118.exe

  • Size

    69KB

  • MD5

    276808deb414c644073593b8d29d886a

  • SHA1

    145fee5cc7920024b53c089d19ff281d9a4ac428

  • SHA256

    cfc5d23ac64eac6d38ee0f3723dec50bba111ef18880b44c3a1fb1081d10902b

  • SHA512

    7e4517c7a3bbb3e0bba2c8f09f65007c6485fee39e08bddb5e560c1e300fe44a4df1a9c5df044d27f757f366a1c89b74ae03f916e14e5c49c52e0e42faad497d

  • SSDEEP

    1536:3k8qkQtjmO5AI9AYkZULavtR96JJpagWsVC:VajmkVkGLoRs0gdVC

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\276808deb414c644073593b8d29d886a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\276808deb414c644073593b8d29d886a_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\net.exe
      "C:\Windows\System32\net.exe" stop Netmen
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop Netmen
        3⤵
          PID:2748
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\System32\net.exe" stop Netmen
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop Netmen
          3⤵
            PID:2716
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\System32\net.exe" stop Netmenc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop Netmenc
            3⤵
              PID:2624
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\System32\net.exe" stop Netmenc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop Netmenc
              3⤵
                PID:2656
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\System32\net.exe" stop Netmen
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2600
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop Netmen
                3⤵
                  PID:2632
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\System32\net.exe" stop Netmen
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2720
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop Netmen
                  3⤵
                    PID:2896
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\System32\net.exe" stop Netmenc
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:376
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop Netmenc
                    3⤵
                      PID:872
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\System32\net.exe" stop Netmenc
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:648
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop Netmenc
                      3⤵
                        PID:2920
                    • C:\Windows\SysWOW64\net.exe
                      "C:\Windows\System32\net.exe" stop NetDDESRV
                      2⤵
                        PID:2192
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop NetDDESRV
                          3⤵
                            PID:2396
                        • C:\Windows\SysWOW64\net.exe
                          "C:\Windows\System32\net.exe" stop NetDDESRV
                          2⤵
                            PID:2392
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop NetDDESRV
                              3⤵
                                PID:2504
                            • C:\Windows\SysWOW64\net.exe
                              "C:\Windows\System32\net.exe" stop NetDDESS
                              2⤵
                                PID:2968
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop NetDDESS
                                  3⤵
                                    PID:3004
                                • C:\Windows\SysWOW64\net.exe
                                  "C:\Windows\System32\net.exe" stop NetDDESS
                                  2⤵
                                    PID:3012
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop NetDDESS
                                      3⤵
                                        PID:2332

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • memory/2708-0-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-5-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-6-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-8-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-11-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-18-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-19-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/2708-21-0x0000000000400000-0x0000000000418000-memory.dmp

                                    Filesize

                                    96KB