Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 06:11

General

  • Target

    5ac36d074f1e29c0b8ba4413a5b5ff35_JaffaCakes118.exe

  • Size

    631KB

  • MD5

    5ac36d074f1e29c0b8ba4413a5b5ff35

  • SHA1

    fdad06f5f73241f49e93e32a728df9d83ba0be5b

  • SHA256

    e64f8c10e792cca6634d78892219a6466e8b609d88aa04a139891d3df8e2020f

  • SHA512

    40e6c082788202471d57e4d50f9ebfad94d08e567111e2190df8dd7a005f2b1427bb253a884f6a041e697fe13f379a52c3912270e311f8540c69cce32578b3a2

  • SSDEEP

    12288:6qwE5KWHBbU7uG6NDBlR7F3Z4mxxCvgLyCK/7m:xF5LHBAS5x7QmXCoGdi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ac36d074f1e29c0b8ba4413a5b5ff35_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ac36d074f1e29c0b8ba4413a5b5ff35_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
        PID:4712
    • C:\Windows\Hacker.com.cn.txt
      C:\Windows\Hacker.com.cn.txt
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3588

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.txt

      Filesize

      631KB

      MD5

      5ac36d074f1e29c0b8ba4413a5b5ff35

      SHA1

      fdad06f5f73241f49e93e32a728df9d83ba0be5b

      SHA256

      e64f8c10e792cca6634d78892219a6466e8b609d88aa04a139891d3df8e2020f

      SHA512

      40e6c082788202471d57e4d50f9ebfad94d08e567111e2190df8dd7a005f2b1427bb253a884f6a041e697fe13f379a52c3912270e311f8540c69cce32578b3a2

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      550701fcf0b58011391d64750df4a58c

      SHA1

      6e8de60ddeb6f6a91411a5f763e20167b2b7a150

      SHA256

      b7b86faed449f85abc4f8d1632eed9d68ea1668ed8ea3440fe1e622d66b672db

      SHA512

      34048714cb94eba6491959106208d2b7aba25568760e982f7c61c6518c33241228a105f5bccbe6bac5518e55fefd494df2623a66f413ff03a3940427bd7aa34b

    • memory/1288-18-0x00000000006F0000-0x00000000006F1000-memory.dmp

      Filesize

      4KB

    • memory/1288-10-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/1288-6-0x00000000023B0000-0x00000000023B1000-memory.dmp

      Filesize

      4KB

    • memory/1288-11-0x00000000034D0000-0x00000000034D1000-memory.dmp

      Filesize

      4KB

    • memory/1288-5-0x00000000023C0000-0x00000000023C1000-memory.dmp

      Filesize

      4KB

    • memory/1288-9-0x0000000002450000-0x0000000002451000-memory.dmp

      Filesize

      4KB

    • memory/1288-8-0x0000000002410000-0x0000000002411000-memory.dmp

      Filesize

      4KB

    • memory/1288-4-0x0000000002440000-0x0000000002441000-memory.dmp

      Filesize

      4KB

    • memory/1288-15-0x0000000003500000-0x0000000003501000-memory.dmp

      Filesize

      4KB

    • memory/1288-17-0x00000000034E0000-0x00000000034E1000-memory.dmp

      Filesize

      4KB

    • memory/1288-0-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1288-14-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/1288-12-0x00000000034C0000-0x00000000034C3000-memory.dmp

      Filesize

      12KB

    • memory/1288-13-0x00000000035C0000-0x00000000035C1000-memory.dmp

      Filesize

      4KB

    • memory/1288-16-0x00000000034F0000-0x00000000034F1000-memory.dmp

      Filesize

      4KB

    • memory/1288-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/1288-2-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/1288-19-0x00000000026D0000-0x00000000026D1000-memory.dmp

      Filesize

      4KB

    • memory/1288-7-0x0000000002430000-0x0000000002431000-memory.dmp

      Filesize

      4KB

    • memory/1288-1-0x0000000002320000-0x0000000002374000-memory.dmp

      Filesize

      336KB

    • memory/1288-27-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1288-28-0x0000000002320000-0x0000000002374000-memory.dmp

      Filesize

      336KB

    • memory/3588-24-0x0000000000EA0000-0x0000000000EF4000-memory.dmp

      Filesize

      336KB

    • memory/3588-30-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/3588-32-0x0000000000EA0000-0x0000000000EF4000-memory.dmp

      Filesize

      336KB