Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 10:49

General

  • Target

    2845d59896de45cc6e77cc39db4b0710_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    2845d59896de45cc6e77cc39db4b0710

  • SHA1

    351131fdcabad360f68cf740f7c2cfeddcc5227b

  • SHA256

    73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9

  • SHA512

    bd3aa0607fb464e0263f2311e14bd5c9f36ef85de234bcc85b9631ba5ca4db4660981bcb0c4ae7d1246c6a72ee6aac3f1b80112c4382458ab16773f828e996a2

  • SSDEEP

    1536:v3i2vQYJt4DTzB5UHiR0LtYa5LBq9fP/N1hXA7YhKZHx8XQIRJjjfqC5e:vXvQWtmB5OA0iWstyY4R8XQELqC5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2845d59896de45cc6e77cc39db4b0710_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2845d59896de45cc6e77cc39db4b0710_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Roaming\KB00657111.exe
      "C:\Users\Admin\AppData\Roaming\KB00657111.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3924
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\POS9AD8.tmp.BAT"
      2⤵
        PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\POS9AD8.tmp.BAT

      Filesize

      286B

      MD5

      e987bc2f3a9db8d73fa5506937a4b7c5

      SHA1

      84b1abcd74fe6467f0fb1729417a79eb514dd922

      SHA256

      6efc40d05a3025af185944d18a6267ff852810e3698cba16aa497476bbf9b705

      SHA512

      77c6468fe7004ad8d233ebca71cc8c35af8420b857692a5498008fbb666418d759d78e6bc37a88c16650f5cd797573f0c6b21df951c2a62eb4dff879af52698f

    • C:\Users\Admin\AppData\Roaming\KB00657111.exe

      Filesize

      96KB

      MD5

      2845d59896de45cc6e77cc39db4b0710

      SHA1

      351131fdcabad360f68cf740f7c2cfeddcc5227b

      SHA256

      73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9

      SHA512

      bd3aa0607fb464e0263f2311e14bd5c9f36ef85de234bcc85b9631ba5ca4db4660981bcb0c4ae7d1246c6a72ee6aac3f1b80112c4382458ab16773f828e996a2

    • memory/1952-0-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1952-2-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1952-1-0x0000000000403000-0x0000000000407000-memory.dmp

      Filesize

      16KB

    • memory/1952-3-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1952-12-0x0000000000403000-0x0000000000407000-memory.dmp

      Filesize

      16KB

    • memory/1952-11-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/3924-9-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/3924-14-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/3924-15-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB