Analysis

  • max time kernel
    25s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 21:52

General

  • Target

    83afda3367cd7f6b82d6ab483d1e923e_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    83afda3367cd7f6b82d6ab483d1e923e

  • SHA1

    cafd03d260613936662a34f77d49f83bc51ecf6d

  • SHA256

    81233a60a00f9ceca0b97caccc717d58dcb8d5739a612ca47aaae517306fb192

  • SHA512

    1fe94b34da81a4b33856e3203271b8fac9c3222f344b43460437fe8f7d4cf5407418c664e4b8fe1d5c9f7566b236b4a636bbe7de06657b4818c70fa9d53e691e

  • SSDEEP

    384:atPEVxH3L5TkLrg4iq+LRIgy64FyKJACzYcCe:aVEXbJk3Kmy4FzYcCe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83afda3367cd7f6b82d6ab483d1e923e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83afda3367cd7f6b82d6ab483d1e923e_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\msdn.exe
      "C:\Users\Admin\AppData\Local\Temp\msdn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 592
        3⤵
          PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\msdn.exe

      Filesize

      17KB

      MD5

      83afda3367cd7f6b82d6ab483d1e923e

      SHA1

      cafd03d260613936662a34f77d49f83bc51ecf6d

      SHA256

      81233a60a00f9ceca0b97caccc717d58dcb8d5739a612ca47aaae517306fb192

      SHA512

      1fe94b34da81a4b33856e3203271b8fac9c3222f344b43460437fe8f7d4cf5407418c664e4b8fe1d5c9f7566b236b4a636bbe7de06657b4818c70fa9d53e691e

    • memory/2484-8-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2484-9-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2484-10-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2484-11-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-0-0x000007FEF508E000-0x000007FEF508F000-memory.dmp

      Filesize

      4KB

    • memory/2488-7-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB