Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 03:28

General

  • Target

    6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    6a132b5be10489db0d0ac619f8ac2f07

  • SHA1

    3b1a2729d5ac7bac20555fe7a507a6727cc7b6bb

  • SHA256

    bf91bcc6a14edcd462c386e18d4fcd1436ea4922e1c822e8e4936ed31aaf757a

  • SHA512

    f62fcabb1d587e364a7b674347669a933e3fe24ef9d2095ff1560b040ad10ba96bcecc80f936f03a512fa7508c9cb807980401ac2b0747f4a2e2cf09b459993e

  • SSDEEP

    384:lWSFaWrOXhxReOzWcHUI3j8NswacbI4gSgaaK6r4vX588xJ:bPUhx3z/HUIz8vacs4gnrMBJ

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\delme.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3028
  • C:\Windows\SysWOW64\E0D3B8B8.EXE
    C:\Windows\SysWOW64\E0D3B8B8.EXE -service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\E0D3B8B8.EXE

    Filesize

    13KB

    MD5

    6a132b5be10489db0d0ac619f8ac2f07

    SHA1

    3b1a2729d5ac7bac20555fe7a507a6727cc7b6bb

    SHA256

    bf91bcc6a14edcd462c386e18d4fcd1436ea4922e1c822e8e4936ed31aaf757a

    SHA512

    f62fcabb1d587e364a7b674347669a933e3fe24ef9d2095ff1560b040ad10ba96bcecc80f936f03a512fa7508c9cb807980401ac2b0747f4a2e2cf09b459993e

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    239B

    MD5

    80e22a7913219dac2fbef0c665e94ed2

    SHA1

    6f21d52b193eb616d1cb4584a75ad96704b891c7

    SHA256

    118b2dda039f3d57baf1b496778bf8c91571e661275715dfe8f92a5bfe908b7d

    SHA512

    f85d0993981d7287b26d0fca7a24020152a26e547b4fc6a705ca46d467d6e4f4d805a54f03cc6fd111e72af2e1a94c792534a7f84f090ec1768ce1c5b75d6666