Analysis

  • max time kernel
    91s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 11:11

General

  • Target

    ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe

  • Size

    450KB

  • MD5

    ed752ab9f0148a0c3bd4c08eb9ae4e52

  • SHA1

    78fe39a3f53bda3761628bb3d92cfdb20f09adaf

  • SHA256

    4d3af26d845a57cbee4d736e0fcc1a19955216706ad7d2af8d14f111d31167e7

  • SHA512

    1c7ab93a6a67a468fc6b84f8d93536386154e46e0ef350a7f71fa77386329951bb3998b5c757dc80b2180e6552a3075f9bc95e134aaaf92a11748087495e1b51

  • SSDEEP

    12288:y2f2hB4yVe0ZU1NQhD94nt1pNBtSkIlaasU3:yIGFV9Dct1plSFlaa

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c system.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c \"C:\Users\Admin\AppData\Roaming\svchost.exe\" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2468
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
          4⤵
          • Modifies WinLogon for persistence
          • System Location Discovery: System Language Discovery
          PID:3076
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3496
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c system.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c \"C:\Users\Admin\AppData\Roaming\svchost.exe\" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4416
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
          4⤵
          • Modifies WinLogon for persistence
          • System Location Discovery: System Language Discovery
          PID:4848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4476
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\system.bat

    Filesize

    320B

    MD5

    ef9cacb4552c5493eb5cbd94d0f39e81

    SHA1

    0dc30c13aacfd87522492bfb9b3da8c42f2f9350

    SHA256

    7c2c7be57123305fe8870fa6e88e8b9a734fa98eeac66c633b0a2d3643dca7b3

    SHA512

    96aee7748833ca2166a1ac741cbc6f6f6ce6f41c51bd6c002684a8b2dbf451aa635f96bd1d1d54ddc539a0525a4bd716ffe775740f4e2fb0f3a232a2567ee14c

  • memory/2740-0-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/2740-7-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/2740-6-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2740-13-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2740-14-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB