Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 05:15

General

  • Target

    3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe

  • Size

    422KB

  • MD5

    3c1b1b0997b7708df9dfc922705e27ea

  • SHA1

    de2ebe17bbd513b34112c1f54383dcd7bff65f3d

  • SHA256

    8ba7c0339ddaee9806d54e193c92d03a114fd047c07db9891d27a087bb044689

  • SHA512

    4411c66b7cad2d06a0be522b737f0d07e95abb17d1d0db168b46aabf300e35350d1de27355f7cbbef5ae5d07be8e0c4bc1d269ba9f77e0b2c74f8f448ba20937

  • SSDEEP

    6144:tl9rOIhjI3Y3by83TdTcQDRcvxCcZXR5sPEHix0IbBBwNt59p0:N99HDTsnsPEHix0II

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Power Settings 1 TTPs 2 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\system32\cmd.exe
      "cmd" /c powercfg -l
      2⤵
      • Power Settings
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\system32\powercfg.exe
        powercfg -l
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
    • C:\Windows\system32\cmd.exe
      "cmd" /c bcdedit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\system32\bcdedit.exe
        bcdedit
        3⤵
          PID:2152
      • C:\Windows\system32\cmd.exe
        "cmd" /c fsutil behavior query DisableDeleteNotify
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Windows\system32\fsutil.exe
          fsutil behavior query DisableDeleteNotify
          3⤵
            PID:2476
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" (get-appxpackage -allusers).name
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2112

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2112-9-0x000000001B550000-0x000000001B832000-memory.dmp

        Filesize

        2.9MB

      • memory/2112-10-0x0000000002860000-0x0000000002868000-memory.dmp

        Filesize

        32KB

      • memory/2540-0-0x000007FEF5803000-0x000007FEF5804000-memory.dmp

        Filesize

        4KB

      • memory/2540-1-0x00000000003B0000-0x0000000000420000-memory.dmp

        Filesize

        448KB

      • memory/2540-2-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2540-4-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2540-3-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2540-11-0x000007FEF5803000-0x000007FEF5804000-memory.dmp

        Filesize

        4KB

      • memory/2540-12-0x000007FEF5800000-0x000007FEF61EC000-memory.dmp

        Filesize

        9.9MB