Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 13:38

General

  • Target

    3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe

  • Size

    52KB

  • MD5

    3959b35ed31572651607d234f10a4d63

  • SHA1

    bf7e1d08ebfc8cc2a36cfa1e9fde42d5be26671d

  • SHA256

    26f955209414728ddb94194f0de91680ae49054a1870a24c2fbc64a899d20981

  • SHA512

    56f2f221991eb8261441ebc41ab8cb5e7168e0e2e27ef73abe71ec63377798c63235b7b8562094a8aca1fe1be08e30e63617bbe930f2a2eaa7f8ac410db14125

  • SSDEEP

    1536:QEybaQJNZtbYlabHAbQSYCNUGHqCnouy8xS:QHaQJj28whVPoutE

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3959b35ed31572651607d234f10a4d63_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:2112
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\WNVJIAXN.tmp

    Filesize

    83KB

    MD5

    fb0dfcccc4a2fd66817e8db6beb688e3

    SHA1

    94996d6d3dbda5f11d3e67238433ab77e78bfb18

    SHA256

    1a0d51d6b063363d0eac18b97871c03f27538be3ee0be3f98cb64a091afd2189

    SHA512

    da676852d5720894f60ff8b00affedc2221cb011ef4ae429dc48d6299c1a3915b7acd250bcafd6e499d56d67c182b90070b373056e6cffaf94c6afcbaf6f4b9a

  • memory/2112-2-0x0000000000220000-0x000000000023C000-memory.dmp

    Filesize

    112KB

  • memory/2112-4-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2112-15-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2680-19-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-18-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-17-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-20-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-22-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-24-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-26-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-28-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB

  • memory/2680-30-0x0000000000120000-0x000000000013C000-memory.dmp

    Filesize

    112KB