Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 13:39

General

  • Target

    30999f103c3100024db2d3f7ab1ceb83_JaffaCakes118.exe

  • Size

    740KB

  • MD5

    30999f103c3100024db2d3f7ab1ceb83

  • SHA1

    a9590f9490f01fb05e2194719d929ca58b2a6225

  • SHA256

    2e3210c014a4d021fb1dcf512ddc69217f1e3568b40424767898661a7dacc0a7

  • SHA512

    c9a01108cf1179f90bf2cb25301e8677a52f89337e3be7e7a8bb71f983c3a54aaeb6b1f6244cacd58290a48707b23eaf4b1fb5c73e035207197a9a1e6801eb60

  • SSDEEP

    12288:GzxveAzCRr454zNAuYrQUsOiDcE13HiUomTG9RFqtK2amYb:CmeCRr4epAuYcjOiggQEEOK2JW

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30999f103c3100024db2d3f7ab1ceb83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\30999f103c3100024db2d3f7ab1ceb83_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\RM Royal Media Ltd.\Ramino Royal Install\install\RummyRoyal_Live_it.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\30999f103c3100024db2d3f7ab1ceb83_JaffaCakes118.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2348
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DBAD15A1DB8154A3ADCF4CA45FE9528E C
      2⤵
      • Loads dropped DLL
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\RM Royal Media Ltd\Ramino Royal Install\install\RummyRoyal_Live_it.msi

    Filesize

    318KB

    MD5

    352079e14fc6ebf4719ce2ed7c3c167a

    SHA1

    d517112ab18ba321b66794f0360b3ff4bd44da3f

    SHA256

    379cb6351ac2ede96abb3af154270f68615b9afe05f12f87545f939738cbd3b4

    SHA512

    3d2625edff18bdedc993849145cd9841f944c905e7e77dc1bb2d94baa6d95f0605cf2e5fd40f1af00e3d9372b6b1f656547374df301b63866790e00e5d51a410

  • \Users\Admin\AppData\Local\Temp\MSI251D.tmp

    Filesize

    14KB

    MD5

    1afa5d8db46927c210ca89b7ec81e1c7

    SHA1

    e5cd5b8f8afe4faf43a64d4c16d048228b9ee2fd

    SHA256

    e55a022de86edfd958583023e9989b94751ea36322587e047c9af642d3fb82dc

    SHA512

    6e860e077149e0466b267f2300ca1eba67eaee419f1bf8cc8e7ad0542472f197407b4ca6dd60632cd731ef4780a7c389bd8dedafa7e330113ef0062f188e4b24