Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 07:54

General

  • Target

    62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    62621a312ed90ed75b001c699323e8ad

  • SHA1

    eb75d807882e291a7d4b51f159f1bf751d47c0f5

  • SHA256

    21386113f911ef4876d3c851f51f424abbf50f178ed1488695f51bf2600a6ea7

  • SHA512

    696634ede2820b31c243d144a86b265fd5e269e51f623e760ea0571b5c935a5dc32d35b287b16eaf8da3a5270aa40983f5f84bb184db104f1bf1ff54cad9641a

  • SSDEEP

    6144:i65cUhWas9kXPucRS7XZN4XxyORRTQx4jWTjf3uX2M9873yLK:Nc8LGcsLMXYORJQ6jKf3up9873y

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\ProgramData\iBpInFlPjEg01805\iBpInFlPjEg01805.exe
      "C:\ProgramData\iBpInFlPjEg01805\iBpInFlPjEg01805.exe" "C:\Users\Admin\AppData\Local\Temp\62621a312ed90ed75b001c699323e8ad_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\iBpInFlPjEg01805\iBpInFlPjEg01805.exe

    Filesize

    312KB

    MD5

    3f99860ed6a73ff6065f9964855091bb

    SHA1

    b22c6ebba8cb1253cf1bce165a3258324979ffa2

    SHA256

    49a7f66041a24c723fad45d444c50cac33a84cb275eb61325b2900f731d469e9

    SHA512

    c15cee717440bddc16e5026d96f9525e278749db48b681ae110c4d4cc86b47e159a787457a1ca8dfd770280e53a350543081969349ba099cffa1a7bf7b77b19e

  • memory/4684-20-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4684-2-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/4684-3-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4684-4-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4684-1-0x00000000771D3000-0x00000000771D4000-memory.dmp

    Filesize

    4KB

  • memory/4684-0-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4684-22-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/4684-40-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-13-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-15-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-14-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-21-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-33-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB