Analysis

  • max time kernel
    147s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 12:54

General

  • Target

    2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    2c6c87978946a950ba6b81ee66fda7ff

  • SHA1

    e4966b915de20213822602c7f47ab13c281e8eb5

  • SHA256

    2bb42083d734c9964146d80917c375efd901c60a2019c1b324687c08c1e22e7e

  • SHA512

    ccc41dd1540305319d2c24c756a2f58f37ad8f84a92882953a24835ef10546e222ead636e9ff413639574b841eb272487ec83a120298099dee8076aa28b1ac90

  • SSDEEP

    384:pvn/zka8gR9oHZGFkMFCRRMQ1FwhC4uZ99m7vwqfhX3RQP:pwas8CRvw04YgkAR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2C6C87~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1344
  • C:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe
    C:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system322c6c87978946a950ba6b81ee66fda7ff_JaffaCakes118.exe

    Filesize

    24KB

    MD5

    2c6c87978946a950ba6b81ee66fda7ff

    SHA1

    e4966b915de20213822602c7f47ab13c281e8eb5

    SHA256

    2bb42083d734c9964146d80917c375efd901c60a2019c1b324687c08c1e22e7e

    SHA512

    ccc41dd1540305319d2c24c756a2f58f37ad8f84a92882953a24835ef10546e222ead636e9ff413639574b841eb272487ec83a120298099dee8076aa28b1ac90

  • memory/1560-4-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2296-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2296-3-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB