Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 12:25

General

  • Target

    49c5a7fb400ff77555abe31a6488160d_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    49c5a7fb400ff77555abe31a6488160d

  • SHA1

    1853c695eea3878b1b4f15d3d3edd5c31e3d3167

  • SHA256

    cf5263fde392d6f83e31d5f8c727611ac99c9c0b6a6b46e7afa024bc41b6f298

  • SHA512

    45ffa5ab02692642986b1c1cd2c579876d5ce7aead9627bbc1bcc6ee9af81a3139c3131bcb92628ea390866ea9e66adaab9999d97a1ab327b5306834562b4651

  • SSDEEP

    768:TYCRkQFrNS5BwnRTCRn7xqjY3mDNDyBy7Gq6rOuboGNw0Peoox:TYLQ3MBwRK8jbyBvsmWx

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49c5a7fb400ff77555abe31a6488160d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\49c5a7fb400ff77555abe31a6488160d_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\killdll.dll killall
      2⤵
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4836
    • C:\Users\Admin\AppData\Local\Temp\update~.exe
      C:\Users\Admin\AppData\Local\Temp\update~.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cacls C:\Windows\system32 /e /p everyone:f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32 /e /p everyone:f
          4⤵
            PID:3680
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
            4⤵
              PID:3824
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_uok.bat
          2⤵
            PID:1388
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 348
            2⤵
            • Program crash
            PID:1272
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 348
            2⤵
            • Program crash
            PID:2004
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 340
            2⤵
            • Program crash
            PID:5112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2368 -ip 2368
          1⤵
            PID:2980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2368 -ip 2368
            1⤵
              PID:4912
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2368 -ip 2368
              1⤵
                PID:4596

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\_uok.bat

                      Filesize

                      224B

                      MD5

                      94266f71b25115b4ff760d65fe97317b

                      SHA1

                      c93ec97ac280e6fb9ec0461f2a6df4511e0ad257

                      SHA256

                      aa585e011694563b95f2fec9c76f56bf4c9498e08c93203360acbbd78bde5ca7

                      SHA512

                      d719045b2173ad4dac382b702bc517ea2e0eb151b11ffe4106bccf58379717e10f530cf2f2607fd27ae7051e5c9362a150bfcab32a4f3dd03505f61bfd537923

                    • C:\Users\Admin\AppData\Local\Temp\update~.exe

                      Filesize

                      9KB

                      MD5

                      1e01566b55739bbc91befa73dee5827b

                      SHA1

                      52f1959305352fb9a7ccddb0261ea0e69f8c0629

                      SHA256

                      99be705551bb1eea39ff313d8e8b6b35489dbf93b409d3110bf2c6460c01eccc

                      SHA512

                      9ac5c002a781e64e5ce5caae8b523af1c9c7f513fc478b37b9df87a83e228761ae1b2c774c61b0c4deacbae669f0d2001a57a748564b1c98d3d31eedcb916fa3

                    • C:\Windows\SysWOW64\killdll.dll

                      Filesize

                      56KB

                      MD5

                      622c82fe356f19b2800e51db3490d8d5

                      SHA1

                      eb62a2e329668c6bf70efaa0647f1bf683a7311a

                      SHA256

                      4d79c7d5ec4030e60fab6a5001b79bf71bd73bf08223c4a1875b990a2fe3cd81

                      SHA512

                      3384d19790e0680570c33ad8bede977c6466e3b14e40ec603efe2063d51e206f5327be9a692c3d0a4ba1b2f5e8f9ac4ec390fefbed709d1239aa17bcb93c97c8

                    • memory/2368-0-0x0000000004000000-0x0000000004028000-memory.dmp

                      Filesize

                      160KB

                    • memory/2368-16-0x0000000004000000-0x0000000004028000-memory.dmp

                      Filesize

                      160KB