Analysis

  • max time kernel
    144s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 01:29

General

  • Target

    0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    0841f34a47ada771fc3c1df32d57b81e

  • SHA1

    96122435ed4b299d214bd7e6d3990bf38cf74034

  • SHA256

    a43e0e7c3263e11462bc01fa68f983054aa1b1ad12abb58a1b876326f9aca501

  • SHA512

    749acbe5194666f9e5c1cbb24444401a4e1d69ade7fbc86c160eb461feeac229478e5b575e0673e3e1497474fb922c25a15bd9ab5517572c50dff7756ff7ddb4

  • SSDEEP

    6144:yYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYklPI2XslQP3nIGS+:V9BvctM85t35JPNJj2WzoRLQYRYzmY21

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 23 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:1480
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:380
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:1088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4064
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4856
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:2296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:1172
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4936
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4456
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3836
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:712
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:736
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2144
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:1216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3108
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:2892
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:680
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:3808
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3496
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:2552
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4656
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:1040
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1832
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:2500
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4204
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:3636
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:3060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4408
      • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe
        C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall
        3⤵
        • Executes dropped EXE
        PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe

    Filesize

    57KB

    MD5

    aab4b0690da35f6f2cd25f213c3d40d7

    SHA1

    8b04f8e25843ab812e1d7fd8ee563556cdda6fe6

    SHA256

    ab0c9bc838d09b943fb49defc87ee8fffda570b69b0ac08c524e6ab965bd84f3

    SHA512

    32e30a3300510ab8c390dcb7d5f0654cf781ceb19c4bc8e5d2dd3ab121df58952ded8db2a48b2fa9a037a447d8b363e18605f4f29567a364d135295164ae21b3

  • C:\Users\Admin\AppData\Local\Temp\msl.log

    Filesize

    285B

    MD5

    44f6e06d470db41408d9037f0a534c5e

    SHA1

    f73c3d749613abac3cdf49d169997d976c5b51e4

    SHA256

    7b78ed07a4ce84454f3cf6ba85031dad762f71b99d83ce7ee02d63530e7e5775

    SHA512

    e56c7271027c350fb64d918adcf0d721fa3c49a3df42dcc060b5b6d8f8b0739e3f57e4975c7cfc505b732b4187b5480b96cf9aeb7f96e7aa7b58cabc63ef88b6

  • memory/380-21-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/736-77-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1040-105-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1088-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1172-49-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1216-82-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1480-15-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2296-43-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2500-110-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2552-99-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2748-71-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2748-9-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2892-88-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3060-127-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3636-122-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3728-29-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-46-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-130-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-68-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-57-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-74-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-12-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-0-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-85-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-40-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-91-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-18-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-119-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-102-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3728-113-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3808-94-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4064-32-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4204-116-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4296-65-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4456-60-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4724-133-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4856-37-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4936-54-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB