Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 09:48

General

  • Target

    3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe

  • Size

    170KB

  • MD5

    3ce1ae2605aa800c205ef63a45ffdbfa

  • SHA1

    8b592b4413cfa168cd704d9943812ffb0b941430

  • SHA256

    87742fa4d67a5d142e77dbeda2cc02bd2a975bf543ea0505045b096a82068c93

  • SHA512

    25cfd395b022f1216eac7735c6dbc973e388a812a7e710296f194a3018cf40abe459b8bfcecfba652de1f73d5312ad556ac4ab5978354a919ccda15953b96cf8

  • SSDEEP

    3072:8OPTvYsKQrML6dVuamswMeONJZFoC3KwHaxcFjgny86g8jXBu:8O7YENdVutswMZF5KwHaxCwy86ZBu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ce1ae2605aa800c205ef63a45ffdbfa_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4580
    • \??\c:\users\admin\appdata\local\temp\3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe
      "c:\users\admin\appdata\local\temp\3ce1ae2605aa800c205ef63a45ffdbfa_jaffacakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\expB333.tmp.bat"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4460
      • C:\Users\Admin\AppData\Roaming\KB01221065.exe
        "C:\Users\Admin\AppData\Roaming\KB01221065.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2140
        • \??\c:\users\admin\appdata\roaming\kb01221065.exe
          "c:\users\admin\appdata\roaming\kb01221065.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 456
          4⤵
          • Program crash
          PID:2368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 444
      2⤵
      • Program crash
      PID:3560
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4580 -ip 4580
    1⤵
      PID:1376
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2140 -ip 2140
      1⤵
        PID:4508

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\expB333.tmp.bat

        Filesize

        286B

        MD5

        b33de23835e2fac18013ebd253d18436

        SHA1

        7480e18d2186670309a003b51adc16a23be791e5

        SHA256

        02ef6ed76b2104696a948ebad2456b7bfa1276b40412803783fb9c67923de5b0

        SHA512

        5bce9b1e6e1b54cdf80e3ee601fc5959bd8d791d159f2b15e60e497e12a1edd23b324b5d789349cd05940bdc18fe003e806a987a57b053bbccd9538899624b2a

      • C:\Users\Admin\AppData\Roaming\KB01221065.exe

        Filesize

        170KB

        MD5

        3ce1ae2605aa800c205ef63a45ffdbfa

        SHA1

        8b592b4413cfa168cd704d9943812ffb0b941430

        SHA256

        87742fa4d67a5d142e77dbeda2cc02bd2a975bf543ea0505045b096a82068c93

        SHA512

        25cfd395b022f1216eac7735c6dbc973e388a812a7e710296f194a3018cf40abe459b8bfcecfba652de1f73d5312ad556ac4ab5978354a919ccda15953b96cf8

      • memory/2892-0-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/2892-2-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/2892-3-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/2892-8-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-64-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-71-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-25-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-23-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-22-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-21-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-20-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-19-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-18-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-66-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-67-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-24-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4312-69-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4460-50-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-49-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-57-0x0000000077992000-0x0000000077993000-memory.dmp

        Filesize

        4KB

      • memory/4460-51-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-52-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-48-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-54-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-53-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-56-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4460-55-0x00000000013C0000-0x00000000013D9000-memory.dmp

        Filesize

        100KB

      • memory/4580-47-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB

      • memory/4580-44-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-46-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-45-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-43-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-42-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-41-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-40-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-39-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-38-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-37-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-35-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-34-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-33-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-32-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-31-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-30-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-28-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-29-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-27-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-36-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB

      • memory/4580-26-0x0000000000710000-0x0000000000729000-memory.dmp

        Filesize

        100KB