Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 23:06

General

  • Target

    69519fb8aada325244527e2f1335bbec_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    69519fb8aada325244527e2f1335bbec

  • SHA1

    ed1c79d103e17c8e3afa8db188cb2090ca322a0e

  • SHA256

    eeff12726d7e09a2e5b60cb18f19c2c280587b3d0db8aab34052e0c5df39e4fb

  • SHA512

    67fded2dbeac0b4752d1282090298fa7ff5a79143457cf316c74decec8641b0091506b09c10a567c1d69018f0d5ed94f840d8636c5f6d5b94f7d560315c8642e

  • SSDEEP

    6144:NtKe6YiDdv3m3mgKHIl7bNIKTQEgjX6mH/0guFK+s53RbAg0xqj2ar/hbLu2fX:NtKe6Zv23YdLwmf0g2nsLAg0sEyX

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69519fb8aada325244527e2f1335bbec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69519fb8aada325244527e2f1335bbec_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\concp32.exe

    Filesize

    395KB

    MD5

    ba605925fb2f3b2bf2d8f038ce6c055f

    SHA1

    2528effd82c84b64aeac184ce200e4f265913447

    SHA256

    c8fdf4e4700d6665daf5d0c850403de22fecefd24fd2e435d0dc674efba11eb9

    SHA512

    0f6994797116893e14853e8f35170ebe3976f8cecfb4a012c1d9775594a40a01d82a6339314d3c987c5d7f31fc9f169d0954fe4943048fb5bceaa03743dda51c

  • C:\Windows\svchost.exe

    Filesize

    387KB

    MD5

    0e3a3688e41b083a6c2c8b2e1b459cb8

    SHA1

    76dc524d1329fd5f39a70e805aac7c36438db3b1

    SHA256

    f432d03593739885f50211801005969049e77d807b7b1f98b924f0be1096e6b0

    SHA512

    1f5be6879901279e8abd5d7132858bdc971932e78f34cea4493084a08d182019be42ce8a7485a12252dd239404e09b3ca39c0a164a77e1da5cccd07f10a39b09

  • memory/656-6-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/656-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1620-15-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB