Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 15:45

General

  • Target

    68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe

  • Size

    145KB

  • MD5

    68311aa2fc6a50e0c2638fe236839ef1

  • SHA1

    be7a392491d2eea95f83c3083294f13313669c00

  • SHA256

    7a772bf9c2521ddaaffebf2038e5a423daba60381c308ca5ddf937604dc8477a

  • SHA512

    894e23b3ee99a21760db3028c423904501f2406084f9f41e2861397ea9104d67890ba2eda30d95a58053ac189fd14b23bdaf9022a969995b4a40bf3a9ec156b4

  • SSDEEP

    3072:+T3LDvRNl/kxRM9B2PSOJHVq61dewszl9ZiXuB3wslNMR8z:+T7DvF8xyyAgFszzwu9

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Recycle.Bin\B6232F3A2DC.exe
      "C:\Recycle.Bin\B6232F3A2DC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Users\Admin\AppData\Local\Temp\T1QE8AA.exe
        "C:\Users\Admin\AppData\Local\Temp\T1QE8AA.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2208

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recycle.Bin\32B8E6619464F2D

          Filesize

          8KB

          MD5

          d49ae6fcd4b6cd63aec285d5e5bc34a2

          SHA1

          2fff7112f737d8e7a3c63ef188cd88649259ae4c

          SHA256

          a9abd3feffbcc75443dcba78eeb90f008e732b340d1a9e5a9e69de101e377f73

          SHA512

          e7247287157641074257021809c028f6887fe8e75471f00c54e547a78401b9e54c4a302309149437f6a8aef0e584be81ae606b5a612dad71012268c6d042acd3

        • \Recycle.Bin\B6232F3A2DC.exe

          Filesize

          145KB

          MD5

          68311aa2fc6a50e0c2638fe236839ef1

          SHA1

          be7a392491d2eea95f83c3083294f13313669c00

          SHA256

          7a772bf9c2521ddaaffebf2038e5a423daba60381c308ca5ddf937604dc8477a

          SHA512

          894e23b3ee99a21760db3028c423904501f2406084f9f41e2861397ea9104d67890ba2eda30d95a58053ac189fd14b23bdaf9022a969995b4a40bf3a9ec156b4

        • \Users\Admin\AppData\Local\Temp\T1QE8AA.exe

          Filesize

          3KB

          MD5

          29090b6b4d6605a97ac760d06436ac2d

          SHA1

          d929d3389642e52bae5ad8512293c9c4d3e4fab5

          SHA256

          98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

          SHA512

          9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

        • memory/308-91-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-0-0x0000000000402000-0x0000000000405000-memory.dmp

          Filesize

          12KB

        • memory/308-3-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/308-14-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/308-84-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-85-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-2-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/308-87-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-88-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-89-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-90-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-68-0x0000000000402000-0x0000000000405000-memory.dmp

          Filesize

          12KB

        • memory/308-92-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-4-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/308-93-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-1-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/308-94-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-95-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-96-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-98-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-97-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-86-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/308-71-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/308-72-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/308-78-0x000000007708F000-0x0000000077091000-memory.dmp

          Filesize

          8KB

        • memory/308-74-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-39-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2208-80-0x0000000075146000-0x0000000075148000-memory.dmp

          Filesize

          8KB

        • memory/2208-61-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-62-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-66-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-65-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-64-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-63-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-60-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-47-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2208-69-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-49-0x0000000001001000-0x0000000001002000-memory.dmp

          Filesize

          4KB

        • memory/2208-67-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-70-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-75-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-50-0x0000000001000000-0x0000000001004000-memory.dmp

          Filesize

          16KB

        • memory/2208-76-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-54-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-77-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-48-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2208-81-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-83-0x0000000075140000-0x0000000075175000-memory.dmp

          Filesize

          212KB

        • memory/2208-55-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-56-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-57-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-58-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-59-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-53-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-46-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-36-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2208-52-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

          Filesize

          312KB

        • memory/2208-38-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2208-34-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2208-35-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2208-109-0x0000000075140000-0x0000000075175000-memory.dmp

          Filesize

          212KB

        • memory/2208-27-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB

        • memory/2284-31-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2284-17-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2284-16-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2284-32-0x00000000001E0000-0x000000000022E000-memory.dmp

          Filesize

          312KB