Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 16:02

General

  • Target

    c92621b96d81ceda323100409b173224_JaffaCakes118.exe

  • Size

    198KB

  • MD5

    c92621b96d81ceda323100409b173224

  • SHA1

    2d266afdb07e28eb6b4dc5414c65aa9e071f19e7

  • SHA256

    bdf3790c8b36caf93702966b6e790379f12179aae2291dea6d50062fee39b308

  • SHA512

    7f074c94c6e26da7077703bb72be97f8db438e6aba6a632189d09a461be6e302acbfd6edd8aabf8c418918b65c305ff6ec09fe4d6b34ba6bbee9aac1100645f0

  • SSDEEP

    3072:Nw1FQ+jW6GgmZZMSMNVtrvulngnMwNCmm08RD76YAK8tTBfV4Tq49oPX:iFjWjbghvupgMCCvuttTBN949oPX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c92621b96d81ceda323100409b173224_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c92621b96d81ceda323100409b173224_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C92621~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2296
  • C:\Windows\SysWOW64\Arbiter\ArbiterSvc.exe
    C:\Windows\SysWOW64\Arbiter\ArbiterSvc.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Arbiter\ArbiterSvc.exe

    Filesize

    198KB

    MD5

    c73bb0a7380515550e8de3275d5f6fd6

    SHA1

    f56e278e11e81c67bf3f9d9bc6eaaa9191d560a5

    SHA256

    89f3e766486f5aeb72ae3ef21e4aa478b83f59e349e95c48802a49c6a2739afc

    SHA512

    03bef5d727b97f4ab22d188206def203c458b069a4efb8ceda0b5898ca97be0f20904889c982be060b84864d9cc0868e4c4c1a41fda64df53cf8dcb939d75ad9

  • memory/2224-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB