Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 21:12

General

  • Target

    3abaa2d9b529ce5f6e602bb5e290ab4b_JaffaCakes118.exe

  • Size

    743KB

  • MD5

    3abaa2d9b529ce5f6e602bb5e290ab4b

  • SHA1

    3d9c9af768610865c90a26e0cdbc7b9ca62c07a7

  • SHA256

    48c8b4a76798979f1f2cc25e88b8a85b86ba5fd57de038c7f8543533031cb107

  • SHA512

    5c6f45400fd46581016dbbb77b14e9388ba09f4f689af06c61ace4b8b14b3726ae4f3535ee868abd9b47ad6eede025d9299200cf418cf39d2c7f66fe3f5293c5

  • SSDEEP

    12288:tRn8S++U4u/n/80dW5A0zyo6JwQ5oAlK+GPsvZWIk8yQQ52LYRg08yPwDRay:X8MU4ufxdW5A2mJr/kNsvEIk8Y3Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3abaa2d9b529ce5f6e602bb5e290ab4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3abaa2d9b529ce5f6e602bb5e290ab4b_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\61642520.BAT
      2⤵
        PID:2336
    • C:\Windows\Doyou
      C:\Windows\Doyou
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:2916

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\61642520.BAT

              Filesize

              225B

              MD5

              6510e7caae02399f1fbdf9cf3e9039c3

              SHA1

              a2a8620528cee2e36ff03147d98807f51be713cd

              SHA256

              33a504e8f89c30e27a28f7c9dea022e53f6affe28c92057c3acd72b155703d1c

              SHA512

              891f63a1bcf927fb707d296c30e81c19c3e374b9eba44675814a52440353e27e2c8883a8654fded0fdf06a267923edeb172d19e2218429c29ffc59c567b9ede4

            • C:\Windows\Doyou

              Filesize

              743KB

              MD5

              3abaa2d9b529ce5f6e602bb5e290ab4b

              SHA1

              3d9c9af768610865c90a26e0cdbc7b9ca62c07a7

              SHA256

              48c8b4a76798979f1f2cc25e88b8a85b86ba5fd57de038c7f8543533031cb107

              SHA512

              5c6f45400fd46581016dbbb77b14e9388ba09f4f689af06c61ace4b8b14b3726ae4f3535ee868abd9b47ad6eede025d9299200cf418cf39d2c7f66fe3f5293c5

            • memory/2692-0-0x0000000000280000-0x0000000000281000-memory.dmp

              Filesize

              4KB

            • memory/2692-13-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB

            • memory/2776-11-0x0000000000260000-0x0000000000261000-memory.dmp

              Filesize

              4KB

            • memory/2776-15-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB

            • memory/2776-17-0x0000000000260000-0x0000000000261000-memory.dmp

              Filesize

              4KB

            • memory/2776-20-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB