Analysis

  • max time kernel
    144s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 17:45

General

  • Target

    436b44a84d46e82ca4a1908bb40bd365_JaffaCakes118.exe

  • Size

    666KB

  • MD5

    436b44a84d46e82ca4a1908bb40bd365

  • SHA1

    e54b8045ca73985fd25329280c95f512bc478e3a

  • SHA256

    d9c2513d0a2b65cad56fae09cd5987dfb4ac711e5351cb28e9d8c22b4ded1210

  • SHA512

    925d1f0982548b2c604db30e4e91816bd833204fdac63f21705b9db7c86d4f0cf6e2ba56711a07ca40dec0b5292639ed0f63b78c3adcacb195c490cb7a26a0d9

  • SSDEEP

    12288:dsoBtnRFoLMsfE0cFS7B/u38qZbhu6+F3Z4mxxto3ABt4QCdeOh:K0tnR4MsncFMkNhd+QmXtQut4QCdeA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\436b44a84d46e82ca4a1908bb40bd365_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\436b44a84d46e82ca4a1908bb40bd365_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4020
  • C:\Windows\start.exe
    C:\Windows\start.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:3952

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\DELME.BAT

            Filesize

            218B

            MD5

            48f2b80d26420cc7d5faaa606c8fc24c

            SHA1

            470f5269142c5cf114fa0a72a0687c495518c4ef

            SHA256

            5e0fe5c87e8a244e0323899042a18a6f260881bba118bfee757839b9cdc8b152

            SHA512

            f54113de3714e0fecabb16e7287547998a0deb870762e2b8c706a6b7869b69a7318db0ee288210d8aaeeebfb8e38c4a4b5d6908adfc96aeb836e18b521c811fa

          • C:\Windows\start.exe

            Filesize

            666KB

            MD5

            436b44a84d46e82ca4a1908bb40bd365

            SHA1

            e54b8045ca73985fd25329280c95f512bc478e3a

            SHA256

            d9c2513d0a2b65cad56fae09cd5987dfb4ac711e5351cb28e9d8c22b4ded1210

            SHA512

            925d1f0982548b2c604db30e4e91816bd833204fdac63f21705b9db7c86d4f0cf6e2ba56711a07ca40dec0b5292639ed0f63b78c3adcacb195c490cb7a26a0d9

          • memory/1868-81-0x0000000000400000-0x0000000000582000-memory.dmp

            Filesize

            1.5MB

          • memory/3304-0-0x0000000000400000-0x0000000000582000-memory.dmp

            Filesize

            1.5MB

          • memory/3304-1-0x0000000000A50000-0x0000000000AA4000-memory.dmp

            Filesize

            336KB

          • memory/3304-12-0x00000000033D0000-0x00000000033D1000-memory.dmp

            Filesize

            4KB

          • memory/3304-11-0x00000000033D0000-0x00000000033D1000-memory.dmp

            Filesize

            4KB

          • memory/3304-10-0x00000000022E0000-0x00000000022E1000-memory.dmp

            Filesize

            4KB

          • memory/3304-9-0x0000000002460000-0x0000000002461000-memory.dmp

            Filesize

            4KB

          • memory/3304-8-0x0000000002430000-0x0000000002431000-memory.dmp

            Filesize

            4KB

          • memory/3304-7-0x0000000002440000-0x0000000002441000-memory.dmp

            Filesize

            4KB

          • memory/3304-6-0x00000000022C0000-0x00000000022C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-5-0x00000000022D0000-0x00000000022D1000-memory.dmp

            Filesize

            4KB

          • memory/3304-4-0x0000000002450000-0x0000000002451000-memory.dmp

            Filesize

            4KB

          • memory/3304-69-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-68-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-67-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-66-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-65-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-64-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-63-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-62-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-61-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-60-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-59-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-58-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-57-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-56-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-55-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-54-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-53-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-52-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-51-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-50-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-49-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-48-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-47-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-46-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-45-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-44-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-43-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-42-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-41-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-40-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-39-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-38-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-37-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-36-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-35-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-34-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-33-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-32-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-31-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-30-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-29-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-28-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-27-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-26-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-25-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-24-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-23-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-22-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-21-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-20-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-19-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-18-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-17-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-16-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-15-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-14-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-13-0x00000000033C0000-0x00000000033C1000-memory.dmp

            Filesize

            4KB

          • memory/3304-3-0x00000000022F0000-0x00000000022F1000-memory.dmp

            Filesize

            4KB

          • memory/3304-2-0x0000000002420000-0x0000000002421000-memory.dmp

            Filesize

            4KB

          • memory/3304-74-0x0000000000400000-0x0000000000582000-memory.dmp

            Filesize

            1.5MB

          • memory/3304-75-0x0000000000A50000-0x0000000000AA4000-memory.dmp

            Filesize

            336KB

          • memory/3304-76-0x00000000033D0000-0x00000000033D1000-memory.dmp

            Filesize

            4KB