Analysis

  • max time kernel
    6s
  • max time network
    7s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 00:58

Errors

Reason
Machine shutdown

General

  • Target

    9eecb673f72c7c0d29e6f1b18c0c9f2b_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    9eecb673f72c7c0d29e6f1b18c0c9f2b

  • SHA1

    796bf6cc1a15ee0486097cc9540390df8b5391ab

  • SHA256

    69b1f9f4de21346dd2ac2fb954026697ae8b2c8bfd535500127079b9ce803c32

  • SHA512

    60d0efbe89d07c27d9c75417e03a275a26a4c6938f7250178a8e984b1aedbaa308407097962ce69210161f9f9198c30f7ffeb26ade97c3007ef550e6a0612459

  • SSDEEP

    1536:wQ4i+YbahKwyxkEvmEl1U3vNXIsfMIj6TDqEEnMUsRE+dWY9:VteKl9pkxIsrjol2KWY

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eecb673f72c7c0d29e6f1b18c0c9f2b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9eecb673f72c7c0d29e6f1b18c0c9f2b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 3014327101 /t REG_SZ /d "%userprofile%\3014327101.exe" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 3014327101 /t REG_SZ /d "C:\Users\Admin\3014327101.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1788
    • C:\Windows\SysWOW64\shutdown.exe
      "C:\Windows\System32\shutdown.exe" /r /f /t 3
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9EECB6~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2792
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2036
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2340-1-0x0000000000140000-0x0000000000147000-memory.dmp

        Filesize

        28KB

      • memory/2340-0-0x0000000000130000-0x000000000013E000-memory.dmp

        Filesize

        56KB

      • memory/2340-2-0x0000000000D20000-0x0000000000D31000-memory.dmp

        Filesize

        68KB

      • memory/2340-4-0x0000000000D20000-0x0000000000D3C000-memory.dmp

        Filesize

        112KB