Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 16:45

General

  • Target

    706a0007757e04f537cab552db5a0fd7_JaffaCakes118.exe

  • Size

    587KB

  • MD5

    706a0007757e04f537cab552db5a0fd7

  • SHA1

    7fc6f49c3521e2b93aa42d23e9404c0bb28ddcc6

  • SHA256

    4082a22131a166a8ff103e2e47d0080b65243e49c578d94d81a65ef26efb1e0a

  • SHA512

    372bbaf9197c6e2165ca27de568a2a13cff42cae24ee77c449ff7c339a24416af3efbedf05331f973dd7509808710cc5e2e5b1858039118f431b97f378258064

  • SSDEEP

    12288:eIGZZXocYI5DEduRVNpssAlsb/qfW1VCGVuhZq:GLDEdM1wsbCEAGQ2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\706a0007757e04f537cab552db5a0fd7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\706a0007757e04f537cab552db5a0fd7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Laura.jar"
      2⤵
        PID:2016

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Laura.jar
      Filesize

      2KB

      MD5

      494791abbc84c5933bbb81c598b0cf42

      SHA1

      a9fd2a2c807d3dc5c9d0a88b512d89878b182f29

      SHA256

      fd0a6a158132efde236f56b1ad8ec9e1fdd1f0d50ee2bc76b9b2900fe832ea70

      SHA512

      7b8e4e6bd7b598ca027c0690f60154e679d4e517e554c8606ecd90dfa2bfe2788ae9c0227cbbe46b91dc782316bfb139f79a6e2e2972fc78fea1db28fd9aa1a3

    • memory/1944-0-0x000007FEF5A2E000-0x000007FEF5A2F000-memory.dmp
      Filesize

      4KB

    • memory/1944-1-0x000007FEF5770000-0x000007FEF610D000-memory.dmp
      Filesize

      9.6MB

    • memory/1944-2-0x000007FEF5770000-0x000007FEF610D000-memory.dmp
      Filesize

      9.6MB

    • memory/1944-4-0x000007FEF5770000-0x000007FEF610D000-memory.dmp
      Filesize

      9.6MB

    • memory/1944-18-0x000007FEF5770000-0x000007FEF610D000-memory.dmp
      Filesize

      9.6MB

    • memory/2016-8-0x0000000002210000-0x0000000002480000-memory.dmp
      Filesize

      2.4MB

    • memory/2016-16-0x0000000000210000-0x0000000000211000-memory.dmp
      Filesize

      4KB

    • memory/2016-17-0x0000000002210000-0x0000000002480000-memory.dmp
      Filesize

      2.4MB