Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 16:12

General

  • Target

    5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe

  • Size

    25KB

  • MD5

    5cacce8ac42d56cecdd22c1abf58c8dc

  • SHA1

    093e18c5b828de48fbd052e5f807088c704c71be

  • SHA256

    ac4fd590e2183f518ac51498dd344448dd657a58909b288e17054adcebdedcba

  • SHA512

    6bda7a8a8e5b14941ab0a60c2d62922f40c0a70ca0634b0bbd7393b6274187878d76915651b2d3f31bf91804325772ce2a2a4c77cb51ad4864b9aeb074b9b7a1

  • SSDEEP

    768:kLehOga3oBM1r6lNdDgGBLjYE2QaMRtQ/gxWha5T:UhgAr6a0j8w0h

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5cacce8ac42d56cecdd22c1abf58c8dc_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\syschk.exe
      C:\Windows\system32\syschk.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\system32\teamozy.dll,_StartRun@16
        3⤵
        • Loads dropped DLL
        PID:2492
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\\emsf.bat
      2⤵
        PID:1540

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\syschk.exe

            Filesize

            16KB

            MD5

            a7f684a18e67bb96caadff94b38dd99f

            SHA1

            238c50688e96cadc10ec454bf70cc0a3d27fbe7f

            SHA256

            2c8465ad3c08282715f5eaefb6194817294238dfd2dc5c33fe285409366db8d1

            SHA512

            0a28712a520cbddd094b4c4fd2d4a9db26ac0d2197eda4cda0b8a91dc91079087d9a3ed05b4b14279e05ad2760af176034500e27f9dac378a44caf281003f36a

          • C:\Windows\SysWOW64\teamozy.dll

            Filesize

            24KB

            MD5

            eb9251cfc608667352ded7838005f282

            SHA1

            aaabc9ef8d7e6ef63aa14139b1c111a1d74db33e

            SHA256

            14ad3f93c22afb32d4fb1ae9c9b70fbe001c8ccc957e1fba8c4da31d45012c36

            SHA512

            652019c8d0bd322d34f678becd5cb188de88d214793afe464fdb5a250217373a9b5d8e390e062948306aa1d1f2233591dbe510f91e6899692ebe7628224729ae

          • \??\c:\emsf.bat

            Filesize

            230B

            MD5

            764f3d327ef2d6474c9651a33e13a260

            SHA1

            94183f98611c9b178d159901f6cfd4d741718a99

            SHA256

            f033477e30795cc376aaeb24e7bfffd7b2aa4bf472e74b1935634010c5942723

            SHA512

            a49ae9397c52f0862d3ee49b45bd6c176d99404d222b52cec345fb3d6a36d6d264425dce5d832358499adcbf3a399f5f22983c2e49df64204405de96fa882cf8

          • memory/1292-0-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/1292-18-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB