Analysis

  • max time kernel
    99s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 15:31

General

  • Target

    6825e13f18bd19525fad779851156e86_JaffaCakes118.exe

  • Size

    279KB

  • MD5

    6825e13f18bd19525fad779851156e86

  • SHA1

    694c836e1f1d2d34129560c9d74388f788616613

  • SHA256

    265ea01b76d3eaa7470d9d2f9675d5c355babe3708392acb2aaf409e3c3f1116

  • SHA512

    b4ebdab98b7fc88a822da3af9a1de4cd9a703bc8b649c06d3f009bcb1628ad46a66d63b34d27f5c70cf6a44abee236d73c9e9abdd5dc3f26ebcd13ea9ded015c

  • SSDEEP

    6144:Ojjei59/UH6cUIRUKulosvL8kKZIKoCzBwORD5zM2amZ:OGD5Ut4kKZIKowRS2amZ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6825e13f18bd19525fad779851156e86_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6825e13f18bd19525fad779851156e86_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KXKQOBRS.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KXKQOBRS.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\KXKQOBRS.exe

    Filesize

    444KB

    MD5

    9bb6826905965c13be1c84cc0ff83f42

    SHA1

    ae7734e7a54353ab13ecba780ed62344332fbc6f

    SHA256

    cfa4f56807405fd36e406688feb970a0d0d4854456ba2da72e4a33a27b01d9ae

    SHA512

    09b5f6be1f638948854a4e332b9c0f74c8583db23c0d3d905c1467a5daaf571a57a04b0e91867b4a8984cb43b19df7fc41dc182841db9dc637389e135cfd211f