Analysis

  • max time kernel
    92s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 09:02

General

  • Target

    6eef31ce6c5d5b0c8da435e308875291_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    6eef31ce6c5d5b0c8da435e308875291

  • SHA1

    45ed6c062faf8aef2dd3cb1d5b204e0ea4072a6c

  • SHA256

    1811676a18080914f8b25792a50f2253b6c54b9f54eb35abe6bfab50c5fa72d5

  • SHA512

    63d778f514199a978615beefa749c867d55a4360d818e0c6bf0a6123cbef251168b316fb552224e0d985a7f0765da4713d2aa1688a9f38ad5a9d2881f507fba1

  • SSDEEP

    3072:7vboV83s5AbCorUE8lXMWCs4dmmQFI2MlouGW3dzL8ipq32RKODNsLendWy6ilRb:7vbx8CrUBF4dmmcIBX9tzwZOgenQauW

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6eef31ce6c5d5b0c8da435e308875291_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6eef31ce6c5d5b0c8da435e308875291_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\6eef31ce6c5d5b0c8da435e308875291_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\6eef31ce6c5d5b0c8da435e308875291_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\ProgramData\urgDs6oi\reT9yTjcd9X.exe
        "C:\ProgramData\urgDs6oi\reT9yTjcd9X.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\ProgramData\urgDs6oi\reT9yTjcd9X.exe
          "C:\ProgramData\urgDs6oi\reT9yTjcd9X.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
            "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /i:2852
            5⤵
              PID:2868
            • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exe" /i:2852
              5⤵
                PID:2700
              • C:\Program Files (x86)\Internet Explorer\ExtExport.exe
                "C:\Program Files (x86)\Internet Explorer\ExtExport.exe" /i:2852
                5⤵
                  PID:1684
                • C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\msinfo32.exe
                  "C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\msinfo32.exe" /i:2852
                  5⤵
                    PID:3824
                  • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
                    "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /i:2852
                    5⤵
                      PID:2232

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\urgDs6oi\RCX8E94.tmp

                    Filesize

                    356KB

                    MD5

                    ede3b21bd5398870807981e4b3c13f90

                    SHA1

                    33d35ba3168ef80873a4aa8f9c718aa448118119

                    SHA256

                    17bf1dea4fbe0ae656dfc5caa6f05446d25b580d510f10c9270d3cfed5d72d74

                    SHA512

                    bd4d646a5a2bef12fafae2034e30b560b47609ef585bc5689962db3bb2d4bda78e76b7ce493c00f3776d4a0d68275778b011c0b22b9d9db7455344517c0dd964

                  • C:\ProgramData\urgDs6oi\reT9yTjcd9X.exe

                    Filesize

                    356KB

                    MD5

                    6eef31ce6c5d5b0c8da435e308875291

                    SHA1

                    45ed6c062faf8aef2dd3cb1d5b204e0ea4072a6c

                    SHA256

                    1811676a18080914f8b25792a50f2253b6c54b9f54eb35abe6bfab50c5fa72d5

                    SHA512

                    63d778f514199a978615beefa749c867d55a4360d818e0c6bf0a6123cbef251168b316fb552224e0d985a7f0765da4713d2aa1688a9f38ad5a9d2881f507fba1

                  • memory/828-28-0x0000000000400000-0x0000000000464000-memory.dmp

                    Filesize

                    400KB

                  • memory/828-29-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/828-22-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/2232-48-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/2232-44-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/2852-37-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/2852-36-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/2852-45-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/2852-47-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/2852-27-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/2852-40-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/2852-38-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/4664-17-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/4664-2-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/4664-5-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/4664-1-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/4664-21-0x0000000075C80000-0x0000000075D70000-memory.dmp

                    Filesize

                    960KB

                  • memory/4664-4-0x0000000000400000-0x000000000045E000-memory.dmp

                    Filesize

                    376KB

                  • memory/4920-3-0x0000000000400000-0x0000000000464000-memory.dmp

                    Filesize

                    400KB

                  • memory/4920-0-0x0000000075CA0000-0x0000000075CA1000-memory.dmp

                    Filesize

                    4KB