Analysis

  • max time kernel
    134s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 03:40

General

  • Target

    c236337c73bf24b77b420964410ece8b_JaffaCakes118.exe

  • Size

    35KB

  • MD5

    c236337c73bf24b77b420964410ece8b

  • SHA1

    8f88e07eca87c28d28575ca8ba1c47a907929a2e

  • SHA256

    9dd7f1e1e9c2f5553af49fb5a652d4d8d824293199e6fd96d920ca5cb6135413

  • SHA512

    3bf48d3435ba784a63e55bf544e0d762a6b755d5efd3b3f055a9ab8dc708eee580b54ab50ca7e185ce299c1919698b31d7874072f51dbb0aa2ca805f77ea8834

  • SSDEEP

    768:2zmBrHGJBFQUw+XSFIEP1VI5H9KwggeiVh4qE3TFgtliY7b42Yj/NeRyO:2mBTOBFA2Eqgg7wpq+YXG/3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c236337c73bf24b77b420964410ece8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c236337c73bf24b77b420964410ece8b_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\yt8a.exe
      C:\Windows\system32\yt8a.exe yt8a
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2292
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~SiGou.bat

          Filesize

          128B

          MD5

          5c43604c6faeeb34a05bd85d6867ad9e

          SHA1

          26eba4b6a748d515c18b7df2a34bb067f562964a

          SHA256

          4d10d6936c1d9d16c40ae2f3520c28bf2e753a846c1c5aae8d9a359d91207af5

          SHA512

          5d20b96e6a6edff0b9dbb8ae5f6c0aba02b1c43ec5c905f24a970b92df8d4f115921c2a364f12d8f57fab2e078a30928d669998c5281fd80d5f4f90d55688845

        • C:\Users\Admin\AppData\Local\Temp\~SiGou.bat

          Filesize

          240B

          MD5

          7444c5d7b0d755c1f53f71138345820d

          SHA1

          534ac44f4bb5ce137006f9a4d87f899a71ea2cdb

          SHA256

          ed7e958dd84e5595ed8f584ca2c1fa0352debe9efa2d961ee73a2a95becdd6e7

          SHA512

          14fa241a9f1563d93641faeab2a1c331694f786d2b7b800241338e05a97b14e4c9a76b16643947b93c96dcb1893ad1f1d917f5742fde77f81415fe74dc16eb68

        • C:\Windows\SysWOW64\yt8a.exe

          Filesize

          35KB

          MD5

          c236337c73bf24b77b420964410ece8b

          SHA1

          8f88e07eca87c28d28575ca8ba1c47a907929a2e

          SHA256

          9dd7f1e1e9c2f5553af49fb5a652d4d8d824293199e6fd96d920ca5cb6135413

          SHA512

          3bf48d3435ba784a63e55bf544e0d762a6b755d5efd3b3f055a9ab8dc708eee580b54ab50ca7e185ce299c1919698b31d7874072f51dbb0aa2ca805f77ea8834

        • memory/1208-13-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2532-0-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2532-14-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB