Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 15:30

General

  • Target

    466ca0138e9c523335ddebcc6b9e4048_JaffaCakes118.exe

  • Size

    685KB

  • MD5

    466ca0138e9c523335ddebcc6b9e4048

  • SHA1

    ac9baa0d77c2c117a5930ae36ecb0027d039357e

  • SHA256

    d470982065f1678e0150a23a969bfc1c4e2727e1058da0d1b888e4cc07a5b300

  • SHA512

    a6f42b77f1afdd2813e7ca5c851df56eb84ba6716548a1a2f24bcc4cb3662f3ce716d4f91d91f30ca3e7be2523036cbdcb763dc7fdcfcd95ee4b67a96bdebf53

  • SSDEEP

    12288:hYnDALFG/wQh0+hu50p3ktQPVN/JaIZrN1F3Z4mxxhX2Fi0yT8i:hqoFkRhXhuu34GfLBQmXcZywi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2568
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

      Filesize

      743KB

      MD5

      d5603cf01dd9c6db0bcfe45f9c8f904c

      SHA1

      f2139317b6bd41f946df974b88de0b9758cba275

      SHA256

      9c53cdd248b771ac6d9ac70d4de71cb421c940f1a8fbaa196598d272528c2389

      SHA512

      25782f6ae20547dc3839a8f3d74d0830baaed58f88410ebeae45b1b5231828a013267f15f57e4c8ad1fc0c9d05ba57d8977a93a71b59c35e126eaba2cd830ec3

    • memory/2568-45-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2596-54-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2596-50-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2596-49-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2688-12-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/2688-8-0x0000000003170000-0x0000000003171000-memory.dmp

      Filesize

      4KB

    • memory/2688-23-0x0000000000860000-0x0000000000861000-memory.dmp

      Filesize

      4KB

    • memory/2688-22-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/2688-21-0x00000000009C0000-0x00000000009C1000-memory.dmp

      Filesize

      4KB

    • memory/2688-20-0x00000000009D0000-0x00000000009D1000-memory.dmp

      Filesize

      4KB

    • memory/2688-19-0x00000000004B0000-0x00000000004B1000-memory.dmp

      Filesize

      4KB

    • memory/2688-18-0x00000000004C0000-0x00000000004C1000-memory.dmp

      Filesize

      4KB

    • memory/2688-17-0x00000000009E0000-0x00000000009E1000-memory.dmp

      Filesize

      4KB

    • memory/2688-16-0x0000000000870000-0x0000000000871000-memory.dmp

      Filesize

      4KB

    • memory/2688-15-0x0000000000890000-0x0000000000891000-memory.dmp

      Filesize

      4KB

    • memory/2688-14-0x0000000003170000-0x0000000003171000-memory.dmp

      Filesize

      4KB

    • memory/2688-13-0x0000000003170000-0x0000000003171000-memory.dmp

      Filesize

      4KB

    • memory/2688-30-0x0000000000D80000-0x0000000000D81000-memory.dmp

      Filesize

      4KB

    • memory/2688-11-0x0000000003170000-0x0000000003171000-memory.dmp

      Filesize

      4KB

    • memory/2688-10-0x0000000003170000-0x0000000003171000-memory.dmp

      Filesize

      4KB

    • memory/2688-9-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2688-24-0x0000000003160000-0x0000000003161000-memory.dmp

      Filesize

      4KB

    • memory/2688-7-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2688-6-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2688-5-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/2688-4-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2688-3-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2688-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2688-1-0x00000000001E0000-0x0000000000234000-memory.dmp

      Filesize

      336KB

    • memory/2688-0-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-25-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/2688-26-0x0000000000D50000-0x0000000000D51000-memory.dmp

      Filesize

      4KB

    • memory/2688-48-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-47-0x00000000001E0000-0x0000000000234000-memory.dmp

      Filesize

      336KB

    • memory/2688-27-0x0000000000D30000-0x0000000000D31000-memory.dmp

      Filesize

      4KB

    • memory/2688-28-0x0000000000D20000-0x0000000000D21000-memory.dmp

      Filesize

      4KB

    • memory/2688-29-0x0000000000D90000-0x0000000000D91000-memory.dmp

      Filesize

      4KB