Analysis

  • max time kernel
    7s
  • max time network
    7s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 02:03

Errors

Reason
Machine shutdown

General

  • Target

    54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe

  • Size

    90KB

  • MD5

    54e0b0172b252617b3fb96f6e899eff3

  • SHA1

    b46e5c4f484fb43d47de75a5b2fd26558335d3c7

  • SHA256

    b48326823cad0a141724e6c6d8a8d0a1f3fd5195a1aed03354a2ccadaf873c38

  • SHA512

    b5d3c85b702b50ecf61947c76cd3665654a7cd81ee203b9bc3c0aaaa52c738562c0d74542f54fb7497155fb5245cdc14063ebc9e46d6146edc33b4ce67e5044f

  • SSDEEP

    1536:hgYPhQXwIiPrrjThO+lUBrzCxry1ec7rUyj239auh53RdXFwW:KYP2XerzhOUxu/XUtauzDFwW

Malware Config

Signatures

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Windows\system32\hal.dll /f /q
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2812
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown -r -t 05 -c "Good bye, my love, good bye"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2712
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2148

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1.bat

              Filesize

              99B

              MD5

              06c5ae8cc629f30b31b0384f5d2d979a

              SHA1

              d3742c22ef6687907d9ef91cb69ebe337130bef7

              SHA256

              0ea0719b9de4b8876d7f7128a3133f4eaed3dddeaa8a2b702d0285fa5d1a6e4a

              SHA512

              f55ab1c047aee51a38b0da0d844f07b5cb633d1ad3ecfb035fa956c94b0c2732a59e8236e53ddacef9286795b37074f20e6283bba40bcf29dbf98baf8b799975