Analysis

  • max time kernel
    22s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 16:13

General

  • Target

    39d7fd9fd033003febb492eec482ceb2_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    39d7fd9fd033003febb492eec482ceb2

  • SHA1

    35e8c96009665ed97ddb1dafeead5575e13e9b62

  • SHA256

    b65a614066394895d68bdfa9aa6a3ccc48fae8ece8532821237205e7c6041821

  • SHA512

    a4461d7f45e9cd1fc23fbeaee587059272746494e313e29a8e12fa2ba38cc511ed84c10223ce5bda10961d87ef75e281a3ced0639e6899a153067e45c57ff7c9

  • SSDEEP

    192:ruRqpkF0vi/jnULeCN0P3T1QvyStx+fDQK6f6lqBWHjY2L:ruRqyF0vWjnULeCyQ2DQX2qBWU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39d7fd9fd033003febb492eec482ceb2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\39d7fd9fd033003febb492eec482ceb2_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Windows\calcnew.exe
      "C:\Windows\calcnew.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Users\Admin\AppData\Local\Temp\calcnew.exe
        "C:\Users\Admin\AppData\Local\Temp\calcnew.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\calcnew.exe
          "C:\calcnew.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\calcnew.exe > nul
            5⤵
              PID:2740
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\calcnew.exe > nul
            4⤵
              PID:2684
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Windows\calcnew.exe > nul
            3⤵
              PID:2736
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\39D7FD~1.EXE > nul
            2⤵
            • Deletes itself
            PID:2792

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\calcnew.exe

          Filesize

          16KB

          MD5

          39d7fd9fd033003febb492eec482ceb2

          SHA1

          35e8c96009665ed97ddb1dafeead5575e13e9b62

          SHA256

          b65a614066394895d68bdfa9aa6a3ccc48fae8ece8532821237205e7c6041821

          SHA512

          a4461d7f45e9cd1fc23fbeaee587059272746494e313e29a8e12fa2ba38cc511ed84c10223ce5bda10961d87ef75e281a3ced0639e6899a153067e45c57ff7c9