Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 07:45

General

  • Target

    d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    d5e517150fb500cf0ab871c9a87b0289

  • SHA1

    beac16c5d6c33a04209683b123efbfa7fa23f0c2

  • SHA256

    eb37576f424a7cc3806bc43d92072aa8089f5754d2a477430f8e65ce1cdabad2

  • SHA512

    7f98a9da1379a5188bdcc3cc27a76a78de52210812f97850cab214608f0f8167985b6c683288bf0ad4b15676252f2e4b565efeb6bcc9f2ad2e2185887ca0c903

  • SSDEEP

    6144:uXYGc9a6BMhhAxfekFECZxVpRgGvbqURPLjJoxGq6IEo:uXYdQU8Ape8gGvbqURzFYGq66

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d5e517150fb500cf0ab871c9a87b0289_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.01.09T16.00\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1488

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.01.09T16.00\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe

            Filesize

            17KB

            MD5

            4927ddbb60db41b4b6fe90540c5ae7bb

            SHA1

            3626a815c0c8039361baf12a6d4fc3a1d06676df

            SHA256

            f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018

            SHA512

            5bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c

          • memory/2708-19-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-37-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-35-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-33-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-31-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-29-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-27-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-25-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-23-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-21-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-17-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-15-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-13-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-11-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-9-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-7-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-5-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-3-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-1-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-0-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-90-0x0000000077770000-0x0000000077771000-memory.dmp

            Filesize

            4KB

          • memory/2708-124-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-144-0x0000000077770000-0x0000000077771000-memory.dmp

            Filesize

            4KB

          • memory/2708-159-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-195-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-42-0x0000000077770000-0x0000000077771000-memory.dmp

            Filesize

            4KB

          • memory/2708-41-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-277-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-318-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-317-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-315-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-302-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-288-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-261-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-225-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-210-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-197-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-196-0x0000000077770000-0x0000000077771000-memory.dmp

            Filesize

            4KB

          • memory/2708-189-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-175-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-142-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-107-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-87-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-70-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-65-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-63-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-61-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-59-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-57-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-53-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-51-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-49-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-47-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-45-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-43-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-314-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB

          • memory/2708-644-0x0000000000500000-0x000000000056C000-memory.dmp

            Filesize

            432KB