Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 08:12

General

  • Target

    0ebb288db2f114e161179e2681df5366_JaffaCakes118.exe

  • Size

    141KB

  • MD5

    0ebb288db2f114e161179e2681df5366

  • SHA1

    6f82dd0907b9915a89f50a6453f618eca162d803

  • SHA256

    6624840d8d9ee3cc7a6b803236c3b91af9b6b479f39183d40dc76849885a4314

  • SHA512

    f67aa1ca0a577fa0f3e1a26f883c21e2a8a2133e11fb9e342a4b5ae0a2482dda456fdb1af44d1009f9f70256fdaf19a5fe7d96a28094fc915182ac9c7df1239f

  • SSDEEP

    3072:1Vn2EV+i5K0opbMqqJI7w7gj9vuxVKQ0+xBhuxelgB5Js:1V2KR5K7pbMqqJI7w7ge0ajchB5

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ebb288db2f114e161179e2681df5366_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ebb288db2f114e161179e2681df5366_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\takeown.exe
      takeown /F C:\Windows\system32\imm32.dll
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2148
    • C:\Windows\SysWOW64\icacls.exe
      icacls C:\Windows\system32\imm32.dll /grant administrators:f
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:2672
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\delf765f4f.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\IMM32.DLL

    Filesize

    121KB

    MD5

    1318930126086eabb2feb266354be694

    SHA1

    0407dc0f6339bf9792c8d7f955fb3ec8d66abf82

    SHA256

    b7d0b14060a91625c9b3d5cbd9e7cd9cc2cef61a569801782b9bf4827a14f007

    SHA512

    ab2789ceaedc96409a9ca75de7cf0e367a25ddc625c4b5dc8004cb668b332cfad5532562693165d41b37aacbcf9ec23394dc5a81596976405df89e5dcd6c4c92

  • C:\Windows\SysWOW64\ole.dll

    Filesize

    64KB

    MD5

    766974e590fc46ed58cdcce118b7432f

    SHA1

    a00209e0ae4de53783dd2ba214f988ea53510e27

    SHA256

    75348353dc765e9c5c7d123e2d7df6f9315d29681c4989b2645b7b3a40d665d7

    SHA512

    4c5d13b0ba67581e19f62b48c34901e61ef0ac9757e7fb1ac2693648444947b3e6f95eb6ba7d09ce57983466f21d9891d3751b7c372c3ab31da6f559f5b0a0a8

  • \??\c:\delf765f4f.bat

    Filesize

    235B

    MD5

    4784b1d1c0016f1bb40fb2641d2e1e73

    SHA1

    d89a5c4ca089dd5c35b47af186ba6cd17241d0ad

    SHA256

    07ea18636c984e3148ea1a7f43cbf5f5f2f8d4fda37c3afbfbde996b8513cc2b

    SHA512

    3ba28ea2cb0de33792b0fdf67ea9a079e638c11c67de6f37edf1f86a184a055e41b3afb98dcd1b483ad15bf78e7cec291d3ad07ab662f077e1bd6e97062272f6

  • memory/2564-12-0x00000000755E0000-0x0000000075650000-memory.dmp

    Filesize

    448KB

  • memory/2564-15-0x00000000755E0000-0x0000000075650000-memory.dmp

    Filesize

    448KB