Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 10:37

General

  • Target

    1756adae42b688e8b3ca27002cd21505_JaffaCakes118.exe

  • Size

    384KB

  • MD5

    1756adae42b688e8b3ca27002cd21505

  • SHA1

    760a3aed77f4dd90f41cb25d71d464dc6ac9882b

  • SHA256

    03dc478d9574c7ff7cdfabf1e7c0183536f6cecbb2008587fe97e3ab2b857a0a

  • SHA512

    147bfdec37de4a0740c46d96c4b2006016930931f0ecbd4534a9926b02415832c6e7e8ed3dcbc346f2f035a2d10f6551790e576f32b63a787efa1d0bbbe00c24

  • SSDEEP

    12288:TvkaZLo6u78rn/8ngITe9Uv/G72Z3uF7/70ZJVr:TvkaZLo6rnWlT2Uv/GiZ3uF8N

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 42 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1756adae42b688e8b3ca27002cd21505_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1756adae42b688e8b3ca27002cd21505_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Users\Admin\AppData\Local\Temp\1756adae42b688e8b3ca27002cd21505_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1756adae42b688e8b3ca27002cd21505_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:3544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\plugin.dat

      Filesize

      238KB

      MD5

      f89b2a147e3ddfe811b1561fec82eb31

      SHA1

      2b238407ee9e264646ad8fd4d4c8fd7fab4273ef

      SHA256

      3bc09c292c4e77109a1aa06519db7eeaed7889933d66437d7a006dd6f6747e6b

      SHA512

      a6e7e12ba66b19071632fa54bd22262c1b92642e61f4578c2a88ec3258e5553fe46591366821cbb64fef37243517f87f714fa0dd99a05492517738db1e94f6c2

    • memory/2436-5-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2436-6-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2436-7-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2436-8-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2436-11-0x0000000010410000-0x0000000010481000-memory.dmp

      Filesize

      452KB

    • memory/2436-14-0x00000000005E0000-0x0000000000651000-memory.dmp

      Filesize

      452KB

    • memory/2436-15-0x00000000005E0000-0x0000000000651000-memory.dmp

      Filesize

      452KB

    • memory/2436-19-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2436-18-0x00000000005E0000-0x0000000000651000-memory.dmp

      Filesize

      452KB

    • memory/2436-22-0x0000000004BE0000-0x0000000004C7D000-memory.dmp

      Filesize

      628KB

    • memory/2436-23-0x0000000004BE0000-0x0000000004C7D000-memory.dmp

      Filesize

      628KB

    • memory/2436-24-0x0000000004EC0000-0x0000000004F5D000-memory.dmp

      Filesize

      628KB

    • memory/2436-26-0x0000000005060000-0x00000000050FD000-memory.dmp

      Filesize

      628KB

    • memory/2436-27-0x0000000005060000-0x00000000050FD000-memory.dmp

      Filesize

      628KB

    • memory/2436-25-0x0000000004EC0000-0x0000000004F5D000-memory.dmp

      Filesize

      628KB

    • memory/2436-33-0x0000000005570000-0x000000000560D000-memory.dmp

      Filesize

      628KB

    • memory/2436-32-0x0000000005570000-0x000000000560D000-memory.dmp

      Filesize

      628KB

    • memory/2436-35-0x0000000005720000-0x00000000057BD000-memory.dmp

      Filesize

      628KB

    • memory/2436-34-0x0000000005720000-0x00000000057BD000-memory.dmp

      Filesize

      628KB

    • memory/2436-31-0x00000000053C0000-0x000000000545D000-memory.dmp

      Filesize

      628KB

    • memory/2436-30-0x00000000053C0000-0x000000000545D000-memory.dmp

      Filesize

      628KB

    • memory/2436-29-0x0000000005210000-0x00000000052AD000-memory.dmp

      Filesize

      628KB

    • memory/2436-28-0x0000000005210000-0x00000000052AD000-memory.dmp

      Filesize

      628KB

    • memory/2436-38-0x00000000058D0000-0x000000000596D000-memory.dmp

      Filesize

      628KB

    • memory/2436-40-0x0000000005A80000-0x0000000005B1D000-memory.dmp

      Filesize

      628KB

    • memory/2436-39-0x0000000005A80000-0x0000000005B1D000-memory.dmp

      Filesize

      628KB

    • memory/2436-42-0x0000000005C30000-0x0000000005CCD000-memory.dmp

      Filesize

      628KB

    • memory/2436-41-0x0000000005C30000-0x0000000005CCD000-memory.dmp

      Filesize

      628KB

    • memory/2436-37-0x00000000058D0000-0x000000000596D000-memory.dmp

      Filesize

      628KB

    • memory/2436-43-0x0000000005DE0000-0x0000000005E7D000-memory.dmp

      Filesize

      628KB

    • memory/2436-44-0x0000000005DE0000-0x0000000005E7D000-memory.dmp

      Filesize

      628KB

    • memory/2436-46-0x0000000005F90000-0x000000000602D000-memory.dmp

      Filesize

      628KB

    • memory/2436-45-0x0000000005F90000-0x000000000602D000-memory.dmp

      Filesize

      628KB

    • memory/2436-47-0x0000000006140000-0x00000000061DD000-memory.dmp

      Filesize

      628KB

    • memory/2436-50-0x00000000062F0000-0x000000000638D000-memory.dmp

      Filesize

      628KB

    • memory/2436-48-0x0000000006140000-0x00000000061DD000-memory.dmp

      Filesize

      628KB

    • memory/2436-49-0x00000000062F0000-0x000000000638D000-memory.dmp

      Filesize

      628KB

    • memory/2436-54-0x00000000058F0000-0x000000000598D000-memory.dmp

      Filesize

      628KB

    • memory/2436-55-0x00000000059A0000-0x0000000005A3D000-memory.dmp

      Filesize

      628KB

    • memory/2436-57-0x0000000005B80000-0x0000000005C1D000-memory.dmp

      Filesize

      628KB

    • memory/2436-60-0x0000000006240000-0x00000000062DD000-memory.dmp

      Filesize

      628KB

    • memory/2436-59-0x0000000005EE0000-0x0000000005F7D000-memory.dmp

      Filesize

      628KB

    • memory/2436-56-0x00000000059A0000-0x0000000005A3D000-memory.dmp

      Filesize

      628KB

    • memory/2436-61-0x00000000063F0000-0x000000000648D000-memory.dmp

      Filesize

      628KB

    • memory/2436-58-0x0000000005D30000-0x0000000005DCD000-memory.dmp

      Filesize

      628KB

    • memory/2436-53-0x00000000058F0000-0x000000000598D000-memory.dmp

      Filesize

      628KB

    • memory/2436-69-0x00000000064A0000-0x000000000653D000-memory.dmp

      Filesize

      628KB

    • memory/4372-0-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4372-9-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB