Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 20:31

General

  • Target

    68d229208ebc417c441d64f4919773ff_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    68d229208ebc417c441d64f4919773ff

  • SHA1

    297974dde8a86684081788d19f6af98448f2f057

  • SHA256

    01e9b1dfc5fba96947199045c60f399a1e466049f4fb5501168329ed1bd758dc

  • SHA512

    61fb33325403fa2a4da002757518986c0e342ee991b9edb3e21f29f47c33a4fb5199a02399012aed1ac68f8bcaddd0302c3eaf46298016d38312d433b74b0322

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNqIoBGx:Dv8IRRdsxq1DjJcqfDDGx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68d229208ebc417c441d64f4919773ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68d229208ebc417c441d64f4919773ff_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp8A38.tmp

    Filesize

    28KB

    MD5

    ec7b9b3b41152d19aa836ebe59f8c917

    SHA1

    4d285315632376455dd1b955eb16af37aa4ae254

    SHA256

    139c3915b32b45bf0892fd4e539746f51eddba2d06dbb5f8cc793ebb183137af

    SHA512

    200e5c7149f4fb170fbdaa7da492c23c599008363724274e12b0eaaa64a730737f61a065da38fc9f579afd6a0c751728711529633d185f5556ccb81c0d929e9b

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    f5a03d337b2d19fe2bab0a7ceee86091

    SHA1

    fd3a5ff347694ac52d4dfabc1d0f161d95125ade

    SHA256

    8f9f966d374904faa56fda226917ef1fadb292a0d6f4313914dedf1f0c4e411e

    SHA512

    39e1ff984ba8ccb284b6e67fde2c9f3cff100ccb2c858b37a17cfb70e7578712f93e9e82fb391ec402970ed071bcaadd84374ee16a5cd53858cc51ab314006aa

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    f7d7524ce94fb5049d692c82bf4b2977

    SHA1

    2f21cf7d98ddb51ba9bf15f14f5c2abdb1155ebe

    SHA256

    6328dcd625721b89b8de3952a7959991ce71e3b48fb0a9891eaef3e496ce4635

    SHA512

    72f70d7202398ba78429499899f2453be2ba9bc0089a3f31a779cb3dc82be1dae4df519be262c189938ca3923706af39a669899567de08c28105228c41cdc2d9

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2232-70-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2232-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2232-82-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2232-75-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2232-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2232-2-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2232-68-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2232-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2232-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2232-42-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2680-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-88-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB