Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 21:20

General

  • Target

    443c247d7c73954401096e443709b6b1_JaffaCakes118.exe

  • Size

    195KB

  • MD5

    443c247d7c73954401096e443709b6b1

  • SHA1

    d45e0d7e56a7104ac25292d8d76c6d23bc5cb2c3

  • SHA256

    aecfbd27f247efb3b6d0bef0b5be144d17a99a4006b6cd707d8542ce791a1841

  • SHA512

    595b621ed47328187847024b5d395b112727fb3164c7d7402f34ff8d2a599a545eef06d2f2aa9cb39d3b3641d33efed3193dadf8e9a1897eb3fd4469d31de7a3

  • SSDEEP

    3072:tdS92uG02qWJFxpPK0T8G61OMw2IZYSS8FVq83nmoGDEvDi:OsDFxdT8y92lSSAq0gDEv2

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\443c247d7c73954401096e443709b6b1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\443c247d7c73954401096e443709b6b1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\pzgs.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2596
    • C:\Windows\SysWOW64\algs.exe
      C:\Windows\system32\algs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Windows\SysWOW64\triafoi.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2760
      • C:\Windows\SysWOW64\spoolsvc.exe
        C:\Windows\system32\spoolsvc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\SysWOW64\vijbiz.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2708
        • C:\Windows\SysWOW64\lssas.exe
          C:\Windows\system32\lssas.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pzgs.bat

    Filesize

    240B

    MD5

    5b05241253844be512db8bcd91e1ec6c

    SHA1

    1ff895e61cf09cb0a1ec039e7785474dae9028bb

    SHA256

    ce512bc6f559e88fa4ab926832699d5bff828ceadfbc92334f7655350686188d

    SHA512

    aef281d9d55ee360f44b6d024287f259623396572055995003e23bcce1400492ffbc9fac1d09fd3d2e9f37920e016782be1584f8d91801b66b878d67915c44f4

  • C:\Windows\SysWOW64\triafoi.bat

    Filesize

    117B

    MD5

    89f2b984b2fe3d86f00a1b404807ce0c

    SHA1

    1b006f73d9de69a4944e0337bd450466a2eefa63

    SHA256

    707b8442d7c037f4052a29089ea64f4663f9558e558059095a1943a8292d0e22

    SHA512

    36490f3f9abdf9e1e8aba8f9705950f8b394e4b1a963e78612d814915909a0ee94f21a2b7ed3eab371481b3ed943fbb2ccf77fa6fac8e17449676096c5417e34

  • C:\Windows\SysWOW64\vijbiz.bat

    Filesize

    128B

    MD5

    4a1d75a94d50ca37bdf7acf07de3bb72

    SHA1

    cac0367d4229dee2d99712ef064cfaa1a3cab055

    SHA256

    04ca5dac871cfe188ad8fa0fcf287cd11b2876350275d0b386bd4c138597a2fb

    SHA512

    598d7d636288086e2eb85c9d1be90894daba5b57273f2aec3be5cdaa439af6b11e629275c61a922ae4c3e7bf11f47c1b3fad3b3f38a01bc7a45bd4a9a24a2f3b

  • \Windows\SysWOW64\algs.exe

    Filesize

    195KB

    MD5

    443c247d7c73954401096e443709b6b1

    SHA1

    d45e0d7e56a7104ac25292d8d76c6d23bc5cb2c3

    SHA256

    aecfbd27f247efb3b6d0bef0b5be144d17a99a4006b6cd707d8542ce791a1841

    SHA512

    595b621ed47328187847024b5d395b112727fb3164c7d7402f34ff8d2a599a545eef06d2f2aa9cb39d3b3641d33efed3193dadf8e9a1897eb3fd4469d31de7a3

  • memory/1728-74-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2272-24-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2272-26-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2272-27-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2272-48-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2612-1-0x0000000000420000-0x0000000000421000-memory.dmp

    Filesize

    4KB

  • memory/2612-2-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2612-22-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2612-0-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2916-71-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB