Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 23:55

General

  • Target

    7645ea6131a2fda2a59fc83d7a1855f9_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    7645ea6131a2fda2a59fc83d7a1855f9

  • SHA1

    84b04aa8b4b9a3531dee5f296c483793beae6eca

  • SHA256

    b7d2c80ea5413cd44db69bd948935927d03fe5d39f9cabdaa3c76c0ef5deabd8

  • SHA512

    a48fa2983936a10d84df6f73f207527e750000b6ef69f99e425230fafe566b3e735cb06e790b0bb09ada03841deab9d22c6466306b4e25bbb5f14a8a31ce415f

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNMD:Dv8IRRdsxq1DjJcqfB

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7645ea6131a2fda2a59fc83d7a1855f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7645ea6131a2fda2a59fc83d7a1855f9_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7ed9266b7307290defb6fee3fed1900

    SHA1

    3e4afaf5fd080817e020ac48e4d073cbac6c0235

    SHA256

    62806cf295429a4dc20bd84e5495b16225d1e84c039eb591b6169f0d02085c94

    SHA512

    eed153de71f9870ef570117eb2f2564edd514a5207be6136c575841e3c6e4944a16d11cbeb1815e1e80119bcb1fe741d6191aa4c05e174422cf30dfb16d6a11e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a10146d58123629dcd3aacb32c9a9408

    SHA1

    a9c994f8167e13fd81676e1b1ba520fccefcb215

    SHA256

    08ea3ff7d1c9dc3f7eb947a88955b657a54830b4bbe95bc52e127dc74325c9f8

    SHA512

    f24de50a3ddc5b9d34cde8aab0b67d06a7f5bae04de76765f178212192b31e06795d10873ac7594553b8e8b2bbb2b7309ddd4c045cd790465aae6b49aebdbc32

  • C:\Users\Admin\AppData\Local\Temp\Cab4560.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4610.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp3AE1.tmp

    Filesize

    28KB

    MD5

    f7a4a3046d47ba45e4b59c896f251ba3

    SHA1

    3e8b4a11ab1c9201eaf8ba3c071167b94d787127

    SHA256

    a35bac19971a567986469670bb3b62a05a3dac2eb7efe1c07ccde198806ffded

    SHA512

    18a24afe39f059aa2fa2252c9d308ef7cb883fef4ad1564ee3497de05cae838a980fd3e9dae49dc02e4ac5678450bc184dd65e836955e4c2677641f8d38d25a5

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    30870f723163aa8f0773663b68ae2fb8

    SHA1

    bf89369c55cc5416add3ac9d0414e04688e943de

    SHA256

    422c1f0a997b26d6fc7e4d86da842b75478d4b35409b03a0c09bc94274eed060

    SHA512

    d8321ef8272694cbe020c4e9564b5f40248dfa2cad056e12147d88910209f3ff3e5eb91ecfdd8fb0f6305a8b12fb67c66af82481115cf299d087331adf442ac0

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    8c81bac1a8f465d505284c0d2da0926b

    SHA1

    1ff498404b13cc3026ec9b4c066ae372b5da9f85

    SHA256

    773f8147a7c7cb1c00d16a1ec675087a0d0e630c9c8e37d9c8f370295cdbed64

    SHA512

    42b4a74d28bbf89bf6d92cac15df83d6f4301ceba7a63d781a54383b2718f28d1ee6ac7fecc8b4e9bb25be403b74d6b7d863704228a2125dc3df9bd1660c2a42

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1716-75-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-35-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-87-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-64-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-82-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-80-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-23-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/3032-79-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-69-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-81-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-67-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-63-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-41-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-10-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/3032-4-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB