Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 01:48

General

  • Target

    5e910dc26713d2948a8fa264b86bb28d_JaffaCakes118.exe

  • Size

    670KB

  • MD5

    5e910dc26713d2948a8fa264b86bb28d

  • SHA1

    c8924b25eb2e0b23e38405bb8d1abb9c9dd0461a

  • SHA256

    f81f4c01e7e4a7abaefff132f82564895280772cae51431e742e8cd06f0a7d30

  • SHA512

    fe79a5fd88077462dd0f9ec4683da57f6026781dcc3a20451964e6b4b726a2e70ce36d43c93fccbc478b3283526c27bffd55c384951efe0b8bb82bde400247ae

  • SSDEEP

    12288:1PWd79rRU9dklzW148Al8ehuCXuCTtn9q9VF3Z4mxxJI3Rip1ZiZ8LBi96hvVr1v:8dpdU/L1PehuWTtn9qTQmXJI3Qp14ZA7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e910dc26713d2948a8fa264b86bb28d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5e910dc26713d2948a8fa264b86bb28d_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
        3⤵
          PID:1332
    • C:\Windows\windows\system32\360.exe
      C:\Windows\windows\system32\360.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:264

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

              Filesize

              743KB

              MD5

              f37eb36ee6d6b5ef30e9ccce34a5b9d6

              SHA1

              061a738e2c133a5bba08ede512d432568bcf9bfc

              SHA256

              85001b31fceccce9894868a1be18ab749c2ed7620bffd76fdc7c189e82b6d1f8

              SHA512

              5b5e86db3a1188cdb21742466c4309cd61730ad87c0fff54d35f855236f74208cd76d3f3f6a677413c9b5e73e50aa9b063d80f5240f6a5730fa070002ae7e393

            • C:\Windows\uninstal.bat

              Filesize

              164B

              MD5

              924ea7ae6df752587469376459875c51

              SHA1

              ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1

              SHA256

              46c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09

              SHA512

              ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35

            • memory/1744-0-0x0000000001000000-0x00000000010B4000-memory.dmp

              Filesize

              720KB

            • memory/1744-1-0x0000000001060000-0x0000000001061000-memory.dmp

              Filesize

              4KB

            • memory/1744-2-0x0000000001000000-0x00000000010B4000-memory.dmp

              Filesize

              720KB

            • memory/1744-3-0x0000000001000000-0x00000000010B4000-memory.dmp

              Filesize

              720KB

            • memory/1744-4-0x0000000001000000-0x00000000010B4000-memory.dmp

              Filesize

              720KB

            • memory/1744-17-0x0000000001000000-0x00000000010B4000-memory.dmp

              Filesize

              720KB

            • memory/3604-19-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB

            • memory/4204-16-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB