Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 21:41

General

  • Target

    c7b1d81dc0a19dfb96606c2d252c7ecb_JaffaCakes118.exe

  • Size

    311KB

  • MD5

    c7b1d81dc0a19dfb96606c2d252c7ecb

  • SHA1

    f875d0c43166110ab92131bed9f67d19ce9ef164

  • SHA256

    d286f39323c6ac32cab31da5dd6bd2fcf7f7185a571b31aa89349e44c7b29793

  • SHA512

    7dc98dbe8ca5131d154627607574cb73408976417c139a12a0aecec1d1b7c5360c118d2fb0289491ce2fc6076385a7ece8d34602362d41ad960c004f21770dd7

  • SSDEEP

    6144:ibjHgyiPJtZtXLsFKE7IrWsTz2TYhGcmQwbvfcUl7lQOcgiEmgXjugDphDZ:SjHCP7/LqPQWO1r27Xl5xcxEfuOhDZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7b1d81dc0a19dfb96606c2d252c7ecb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c7b1d81dc0a19dfb96606c2d252c7ecb_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4224
  • C:\Windows\windows_logn
    C:\Windows\windows_logn
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:4792

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\uninstal.bat

            Filesize

            218B

            MD5

            4c43599d4ad9b10cbc861e8c6f584cde

            SHA1

            1d5dac84cef3ee2148fccdb51749d48cc4692cce

            SHA256

            dc9b2af5e76c4281af5c8801023173f538e63148e168b4e3c16ad63aba50b463

            SHA512

            64b0afbce78ea0f4ff652a9dc69103eb90e944f2e9f6a58decfbfb9b5cfe2f612583e0211000da3c5e5ab6427ecf1f89b32dd0f519463a3f8821d239c8a11b4e

          • C:\Windows\windows_logn

            Filesize

            311KB

            MD5

            c7b1d81dc0a19dfb96606c2d252c7ecb

            SHA1

            f875d0c43166110ab92131bed9f67d19ce9ef164

            SHA256

            d286f39323c6ac32cab31da5dd6bd2fcf7f7185a571b31aa89349e44c7b29793

            SHA512

            7dc98dbe8ca5131d154627607574cb73408976417c139a12a0aecec1d1b7c5360c118d2fb0289491ce2fc6076385a7ece8d34602362d41ad960c004f21770dd7

          • memory/3560-8-0x0000000000400000-0x0000000000519000-memory.dmp

            Filesize

            1.1MB

          • memory/3560-9-0x0000000000590000-0x0000000000591000-memory.dmp

            Filesize

            4KB

          • memory/3560-14-0x0000000000400000-0x0000000000519000-memory.dmp

            Filesize

            1.1MB

          • memory/3560-15-0x0000000000570000-0x0000000000571000-memory.dmp

            Filesize

            4KB

          • memory/3560-17-0x0000000000590000-0x0000000000591000-memory.dmp

            Filesize

            4KB

          • memory/5100-0-0x0000000000400000-0x0000000000519000-memory.dmp

            Filesize

            1.1MB

          • memory/5100-1-0x0000000000600000-0x0000000000601000-memory.dmp

            Filesize

            4KB

          • memory/5100-2-0x0000000000400000-0x0000000000519000-memory.dmp

            Filesize

            1.1MB

          • memory/5100-3-0x0000000000630000-0x0000000000631000-memory.dmp

            Filesize

            4KB

          • memory/5100-12-0x0000000000400000-0x0000000000519000-memory.dmp

            Filesize

            1.1MB