Analysis

  • max time kernel
    136s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 19:30

General

  • Target

    689ec91be04358e43ac9b21e156e53e8_JaffaCakes118.exe

  • Size

    83KB

  • MD5

    689ec91be04358e43ac9b21e156e53e8

  • SHA1

    0199f1d43e3e1ec8de3577071a4a42eeae9df69d

  • SHA256

    3828d46f5602d20bdd7ff4628c8a91031890c3b2ca27e949579df75ed1995177

  • SHA512

    0dc068997de8360889b22b2748f35b4a5495972191f9d8ccbd95215301d9486c18ba7a25ee9e66e0234577b4915f51b26579592fbbd6d31b18ef9f87cb75823c

  • SSDEEP

    1536:ukjECLp7lwLCRenI5z3fwu7RG+JdDLeJh4iLh8UR5hd:jjEClSI5zvVBLeL4QFh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\689ec91be04358e43ac9b21e156e53e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\689ec91be04358e43ac9b21e156e53e8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\exp9F2E.tmp.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3868
    • C:\Users\Admin\AppData\Roaming\KB00052081.exe
      "C:\Users\Admin\AppData\Roaming\KB00052081.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2808

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\exp9F2E.tmp.bat

          Filesize

          286B

          MD5

          5759cd2474fd095e3c0f876d80513343

          SHA1

          6560b8f35737c680ee42ec97c124f828b48c74cb

          SHA256

          6c0efd2e3d308ad9f9c0db91fb9a9f4991d25720b008a1728d84e0b2056a8c4c

          SHA512

          c382c9a9c11c45636d4a8eb9e35c4638d5c3c840239345e5d7fb15534ea767467603897823993321aaa75a9832574734072255d373784521f8ae6cb677446c0f

        • C:\Users\Admin\AppData\Roaming\KB00052081.exe

          Filesize

          83KB

          MD5

          689ec91be04358e43ac9b21e156e53e8

          SHA1

          0199f1d43e3e1ec8de3577071a4a42eeae9df69d

          SHA256

          3828d46f5602d20bdd7ff4628c8a91031890c3b2ca27e949579df75ed1995177

          SHA512

          0dc068997de8360889b22b2748f35b4a5495972191f9d8ccbd95215301d9486c18ba7a25ee9e66e0234577b4915f51b26579592fbbd6d31b18ef9f87cb75823c

        • memory/628-0-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/628-1-0x00007FFF85210000-0x00007FFF85405000-memory.dmp

          Filesize

          2.0MB

        • memory/628-9-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2808-7-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2808-11-0x00007FFF85210000-0x00007FFF85405000-memory.dmp

          Filesize

          2.0MB

        • memory/2808-12-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB