Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 15:39

General

  • Target

    5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe

  • Size

    352KB

  • MD5

    5c92043f41ab489d9a1bb797cd3316ee

  • SHA1

    6148c67ecb92bf90b260a50d9b0b6589ae526173

  • SHA256

    54d4b81b529fe9ef2e1b091f819bd803c10223a1651fa74a73aa6efca03e696d

  • SHA512

    4bd622244c7792c954e5c3a89080e292f22b1613a1c6736c4a3fb5445ef0fa0119544956927fd553600e6ae7fcbcfb70619a81de7a61dfdb89f671b556e6231e

  • SSDEEP

    6144:AOQph/0d8DY/HaTTJ29lxV3QXH6Q7OMGB0K350VWw9CY7WWyZ/08oYqx+OWnKlAG:A5PvYvPQXaQSMEC05YqWyZ/0DoviACuN

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe
      5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe
      2⤵
        PID:2584
      • C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe
        5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3356
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3896
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:3484
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5c92043f41ab489d9a1bb797cd3316ee_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1428
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3956
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:3512
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\dvd.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dvd.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4404
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\dvd.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dvd.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1528
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        2⤵
          PID:2596
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          2⤵
          • NTFS ADS
          PID:2656

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\xCocaine.txt

              Filesize

              352KB

              MD5

              5c92043f41ab489d9a1bb797cd3316ee

              SHA1

              6148c67ecb92bf90b260a50d9b0b6589ae526173

              SHA256

              54d4b81b529fe9ef2e1b091f819bd803c10223a1651fa74a73aa6efca03e696d

              SHA512

              4bd622244c7792c954e5c3a89080e292f22b1613a1c6736c4a3fb5445ef0fa0119544956927fd553600e6ae7fcbcfb70619a81de7a61dfdb89f671b556e6231e

            • memory/3028-0-0x0000000074D42000-0x0000000074D43000-memory.dmp

              Filesize

              4KB

            • memory/3028-1-0x0000000074D40000-0x00000000752F1000-memory.dmp

              Filesize

              5.7MB

            • memory/3028-2-0x0000000074D40000-0x00000000752F1000-memory.dmp

              Filesize

              5.7MB

            • memory/3028-15-0x0000000074D40000-0x00000000752F1000-memory.dmp

              Filesize

              5.7MB

            • memory/3356-4-0x0000000000400000-0x0000000000470000-memory.dmp

              Filesize

              448KB

            • memory/3356-5-0x0000000000400000-0x0000000000470000-memory.dmp

              Filesize

              448KB