Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 13:45

General

  • Target

    4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe

  • Size

    293KB

  • MD5

    4e93205ab202f5e3f637a6babbc5bd1e

  • SHA1

    78dbc5730e69dbbcb14e1e73762647430a7bd555

  • SHA256

    3119a59dc13e0fbc43b15b6321ac115c0098de4abcdd2d68367f1174c158ec33

  • SHA512

    8e02d6e88f07eb853588d73ef7c51ca861796824bcae0107bc5f48a0985cc63afee53b9d30f327bcc43cdac090ecbe56e65015c2a6eb8942cfd49ba672e85e56

  • SSDEEP

    6144:XPdMYMANEVzGlcEDUl4qaRYVQxJTGbusJRhgnGXcTD7Xm2BeddhMHXoH/:5NEh8cSLqdasisDhgnGsBBedDM3of

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1116
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1188
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1248
          • C:\Users\Admin\AppData\Local\Temp\4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\4e93205ab202f5e3f637a6babbc5bd1e_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2324
            • C:\Users\Admin\AppData\Roaming\Bigaja\zeid.exe
              "C:\Users\Admin\AppData\Roaming\Bigaja\zeid.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2880
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp847b583d.bat"
              3⤵
              • Deletes itself
              PID:2452
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:624

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp847b583d.bat

            Filesize

            271B

            MD5

            311040082a0bf64d843b13b637a33cf4

            SHA1

            21ab6c5d224d0e0631f730becf25df633f36c8f8

            SHA256

            435eccab202fa39b8769345786345833fa4bb3a3a8117121191a95331bcbea42

            SHA512

            be25a714f8659104361db723a7682d1b80ac05576da1d3871c210e4f588d9a7e875fcb45718539e3c11795c2b1d363e6f5bcc152791460092d1a2969643d463f

          • C:\Users\Admin\AppData\Roaming\Efdy\cuxo.ivb

            Filesize

            380B

            MD5

            5b1d970d84e350e6714144d91df494dd

            SHA1

            4ece192c593120cb518a43b76c0d2e899b5a111f

            SHA256

            040f92d7afb43b496b14a9578fd1b61dde3458bec0ecd2ec53c499971c99b444

            SHA512

            57b8330d466981144860d3d381e7ddc2c2e967dc4ebe81085dd14cd6103cd2aaff07c1cbe7df28ead9a045d180a66db23b9774f78592b616c7216f990298fe4d

          • \Users\Admin\AppData\Roaming\Bigaja\zeid.exe

            Filesize

            293KB

            MD5

            bb2478c16e50ec04f07a36df979fc41a

            SHA1

            dbdce05598583c301912093bee3eb12efc98062b

            SHA256

            37bf7980dc8c3e53e813560d7e2a695052fbe4c4b5a88d099e78a95297c5ef67

            SHA512

            841a69ebc18dd69f29368867f0d942c681a53323335876d07c22398b2b6f7d5c18b38d63e432fd84967942f98b44ac705175c17012c7945d90ae4b2acb14dcc2

          • memory/624-48-0x0000000001CE0000-0x0000000001D21000-memory.dmp

            Filesize

            260KB

          • memory/624-46-0x0000000001CE0000-0x0000000001D21000-memory.dmp

            Filesize

            260KB

          • memory/624-47-0x0000000001CE0000-0x0000000001D21000-memory.dmp

            Filesize

            260KB

          • memory/624-45-0x0000000001CE0000-0x0000000001D21000-memory.dmp

            Filesize

            260KB

          • memory/1116-21-0x00000000001B0000-0x00000000001F1000-memory.dmp

            Filesize

            260KB

          • memory/1116-27-0x00000000001B0000-0x00000000001F1000-memory.dmp

            Filesize

            260KB

          • memory/1116-23-0x00000000001B0000-0x00000000001F1000-memory.dmp

            Filesize

            260KB

          • memory/1116-25-0x00000000001B0000-0x00000000001F1000-memory.dmp

            Filesize

            260KB

          • memory/1116-19-0x00000000001B0000-0x00000000001F1000-memory.dmp

            Filesize

            260KB

          • memory/1188-37-0x0000000002040000-0x0000000002081000-memory.dmp

            Filesize

            260KB

          • memory/1188-31-0x0000000002040000-0x0000000002081000-memory.dmp

            Filesize

            260KB

          • memory/1188-33-0x0000000002040000-0x0000000002081000-memory.dmp

            Filesize

            260KB

          • memory/1188-35-0x0000000002040000-0x0000000002081000-memory.dmp

            Filesize

            260KB

          • memory/1248-41-0x00000000025A0000-0x00000000025E1000-memory.dmp

            Filesize

            260KB

          • memory/1248-40-0x00000000025A0000-0x00000000025E1000-memory.dmp

            Filesize

            260KB

          • memory/1248-42-0x00000000025A0000-0x00000000025E1000-memory.dmp

            Filesize

            260KB

          • memory/1248-43-0x00000000025A0000-0x00000000025E1000-memory.dmp

            Filesize

            260KB

          • memory/2324-68-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-58-0x0000000001F30000-0x0000000001F71000-memory.dmp

            Filesize

            260KB

          • memory/2324-164-0x00000000002C0000-0x000000000030B000-memory.dmp

            Filesize

            300KB

          • memory/2324-1-0x00000000002C0000-0x000000000030B000-memory.dmp

            Filesize

            300KB

          • memory/2324-5-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2324-81-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-79-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-77-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-76-0x00000000772A0000-0x00000000772A1000-memory.dmp

            Filesize

            4KB

          • memory/2324-74-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-140-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-72-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-70-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-4-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2324-0-0x0000000000270000-0x00000000002B1000-memory.dmp

            Filesize

            260KB

          • memory/2324-2-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2324-165-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2324-66-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-64-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-62-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-60-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2324-59-0x0000000001F30000-0x0000000001F71000-memory.dmp

            Filesize

            260KB

          • memory/2324-51-0x0000000001F30000-0x0000000001F71000-memory.dmp

            Filesize

            260KB

          • memory/2324-55-0x0000000001F30000-0x0000000001F71000-memory.dmp

            Filesize

            260KB

          • memory/2324-53-0x0000000001F30000-0x0000000001F71000-memory.dmp

            Filesize

            260KB

          • memory/2880-16-0x0000000000340000-0x000000000038B000-memory.dmp

            Filesize

            300KB

          • memory/2880-17-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2880-285-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2880-283-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/2880-15-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB