Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 07:26 UTC

General

  • Target

    1265301e45d6721d2b7d2b8263f23c20_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    1265301e45d6721d2b7d2b8263f23c20

  • SHA1

    f46d2fc5f2a5d9bd2ccb24ff458fed608ecb83b8

  • SHA256

    150e99b7247955b4c60ead4f979b8a5c9500ecec84165fba32f3df2d1cced6d6

  • SHA512

    82d3981fe2e4c7689e8c8a3417264cb52a8e9d2d005554bd7599959a8e9543621d211954ad6e4bd79beaab56f34032fd5ad9d86e72849a05d8f792dffbb1dd68

  • SSDEEP

    1536:Er1fEeBh6ssMFaepW15y7oifJIrubBdJDzDQm2JuG1NBlM8Gj5MPH7CU8hqu:EpJBhDJ8ifJIKBdJDz8QOi5MPH7d8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:384
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:480
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:604
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:852
                • C:\Windows\system32\wbem\wmiprvse.exe
                  C:\Windows\system32\wbem\wmiprvse.exe
                  4⤵
                    PID:664
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k RPCSS
                  3⤵
                    PID:680
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                    3⤵
                      PID:756
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                      3⤵
                        PID:820
                        • C:\Windows\system32\Dwm.exe
                          "C:\Windows\system32\Dwm.exe"
                          4⤵
                            PID:1168
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs
                          3⤵
                            PID:856
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService
                            3⤵
                              PID:976
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k NetworkService
                              3⤵
                                PID:292
                              • C:\Windows\System32\spoolsv.exe
                                C:\Windows\System32\spoolsv.exe
                                3⤵
                                  PID:920
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                  3⤵
                                    PID:1080
                                  • C:\Windows\system32\taskhost.exe
                                    "taskhost.exe"
                                    3⤵
                                      PID:1120
                                    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                      3⤵
                                        PID:1620
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                        3⤵
                                          PID:2496
                                        • C:\Windows\system32\sppsvc.exe
                                          C:\Windows\system32\sppsvc.exe
                                          3⤵
                                            PID:2468
                                        • C:\Windows\system32\lsass.exe
                                          C:\Windows\system32\lsass.exe
                                          2⤵
                                            PID:488
                                          • C:\Windows\system32\lsm.exe
                                            C:\Windows\system32\lsm.exe
                                            2⤵
                                              PID:496
                                          • C:\Windows\system32\csrss.exe
                                            %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                            1⤵
                                              PID:392
                                            • C:\Windows\system32\winlogon.exe
                                              winlogon.exe
                                              1⤵
                                                PID:432
                                              • C:\Windows\Explorer.EXE
                                                C:\Windows\Explorer.EXE
                                                1⤵
                                                  PID:1192
                                                  • C:\Users\Admin\AppData\Local\Temp\1265301e45d6721d2b7d2b8263f23c20_JaffaCakes118.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1265301e45d6721d2b7d2b8263f23c20_JaffaCakes118.exe"
                                                    2⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1984

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • memory/1984-0-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-2-0x0000000077BA0000-0x0000000077BA1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1984-1-0x0000000077B9F000-0x0000000077BA0000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1984-3-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-4-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-5-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-6-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-7-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-8-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-9-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-10-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-11-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-12-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-13-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-14-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-15-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-16-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-17-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1984-18-0x0000000000400000-0x0000000000440000-memory.dmp

                                                  Filesize

                                                  256KB

                                                We care about your privacy.

                                                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.