Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 06:40

General

  • Target

    83657ab8e92c6af61bf0a8bac9e923c9_JaffaCakes118.exe

  • Size

    21KB

  • MD5

    83657ab8e92c6af61bf0a8bac9e923c9

  • SHA1

    54448b816360fcf03e99d2f16fbc84bf1158db15

  • SHA256

    810b9217e471be345a7f29c2ef531fab215b499a1a3901358163dc9ebb301c2b

  • SHA512

    111405764f688dfa9000857b7ac373cdd2343ae891aef3e4833d03544ea34e6d3573b02fc709399cad07f87d27f847dc4cc822e5281f68e07d9b0a3bf90f1e24

  • SSDEEP

    384:rsOVL3GUoU+ssXbOnS5twtmWF0jvZSIhaQYIg:rDVyRssLtwCjRVaLH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83657ab8e92c6af61bf0a8bac9e923c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83657ab8e92c6af61bf0a8bac9e923c9_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwmain.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwmain.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4076
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwsrv.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwsrv.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwstub.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwstub.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwproxy.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwproxy.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\83657A~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3632
  • C:\Windows\SysWOW64\svost.exe
    C:\Windows\SysWOW64\svost.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwmain.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwmain.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwsrv.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwsrv.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4844
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwstub.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwstub.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4572
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwproxy.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwproxy.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\svost.exe

          Filesize

          21KB

          MD5

          83657ab8e92c6af61bf0a8bac9e923c9

          SHA1

          54448b816360fcf03e99d2f16fbc84bf1158db15

          SHA256

          810b9217e471be345a7f29c2ef531fab215b499a1a3901358163dc9ebb301c2b

          SHA512

          111405764f688dfa9000857b7ac373cdd2343ae891aef3e4833d03544ea34e6d3573b02fc709399cad07f87d27f847dc4cc822e5281f68e07d9b0a3bf90f1e24