Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 18:10

General

  • Target

    70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe

  • Size

    212KB

  • MD5

    70ae93451c6c2afe87ac720c26ac78f2

  • SHA1

    316eb629d9ce23b78a64f2fab2e493e996cc7894

  • SHA256

    4503f3f50d0490a6885db5d061c551cb0fa8571d55ab6285b80b3a9de9ed88f4

  • SHA512

    a5897adbdcbdcf118c2776cbe3439682a423f283501456dd7202fe27b5a6ca3bc8dbdfb077557e306bc180170676e3b4b043ae699db4df4e52f55a6ca4406d2a

  • SSDEEP

    6144:GslVexvfFck/oQg0nKzsEGQQGq64xjdADA727s94:To5VksEGQLq64nJV4

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Roaming\magescan\magescan.exe
      C:\Users\Admin\AppData\Roaming\magescan\magescan.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2792
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\70AE93~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsyDCBA.tmp\DLLWebCount.dll

    Filesize

    28KB

    MD5

    d825e4003d1697fd4bc45361e222746c

    SHA1

    e9d4b1073aac15d4dbb430471fcaea549e633d13

    SHA256

    c79e4be74eecf16f2f7f1d39724c938bf372e9568bb96fa4610926a57fe323f5

    SHA512

    7740a18cae5a42963c748a49ac6175482c93b34dce703a7cf24f5828ee6cdc19eb2669a634b64c2a4c861272f7e9b9e943455195a7cd6afcd8fa5586744eb86f

  • \Users\Admin\AppData\Local\Temp\nsyDCBA.tmp\Math.dll

    Filesize

    66KB

    MD5

    9eb6cecdd0df9fe32027fcdb51c625af

    SHA1

    52b5b054ff6e7325c3087822901ea2f2c4f9572a

    SHA256

    54cf1572ed47f614b0ffb886c99fc5725f454ef7ff919fbb2fd13d1cbe270560

    SHA512

    864742ec6f74f94057b54cd9b09707c0125ac8db4844fa80af201e8b72a811bb68276c993e75bce67e5ece4f83644572edbdee5e963634c5a37839615faea97a

  • \Users\Admin\AppData\Local\Temp\nsyDCBA.tmp\SelfDelete.dll

    Filesize

    24KB

    MD5

    ddc0d6806073a5b034104c88288ca762

    SHA1

    9663cc10c496f05d6167e19c3920245040e5e431

    SHA256

    2f4767da9dc7e720d910d32d451674cd08b7892ca753ec5c10b11fe85e12f06b

    SHA512

    545ca797a397cfcbd9b5d3bd2da2e3219ba7a294e541831655c5763a7f17480fd0b990d0c2e58ba8c71f81d85472b2da6d079b8211b44c40c8c36d21168ec054

  • \Users\Admin\AppData\Local\Temp\nsyDCBA.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Roaming\magescan\magescan.exe

    Filesize

    332KB

    MD5

    ff0063e52a45b7b303723c62cf8a72bc

    SHA1

    3f0a86bebdf67f51422b752bd169bab109af5a86

    SHA256

    667476333f349a64a4f8282ec73d8ded5c091860d987f10fcff2580f9a3aafa5

    SHA512

    fd8287bbc097e977ab53dcdf4a00c7ead7f620f178deddfadcab5e71ec3f247962c2cb03df275fc54878730f23a0c8bf532841faba1e9873649ee98a2e9a7467

  • memory/1172-10-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB