Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 03:01

General

  • Target

    725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    725a2e3a6f4508faba099b73cace171a

  • SHA1

    8742ed151382f82b019140de24981d63148de876

  • SHA256

    299a11fa94e13485e81aadcad4bfd330be9f9b6a941a906ed6c6f3048b0ab516

  • SHA512

    f50b65531d1636688ba3d5e8d7893cf2f401093041c3bb92decc6b5b9b71b67fca93f2945858a1213f6acb46093adb7592a87a346254957997ad36edf67024dd

  • SSDEEP

    49152:OFUcx88PWPOpX0SFziMtY5B27Sy05NRVjveD4hvPSn+BWwhyGc:O+K88uPCHBO+7STP7jvUIHSn+B3hyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Local\Temp\8BDB.tmp
      "C:\Users\Admin\AppData\Local\Temp\8BDB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.exe 9F5553BB5C4D694D1AFE984D8DD746F1E1554602E80B08E0424EC0B67493D0FBC92039E01018855D583A18B7991B287C6F1A7E619FF5D687F90194BA6C912795
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.docx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\725a2e3a6f4508faba099b73cace171a_JaffaCakes118.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\8BDB.tmp

    Filesize

    2.0MB

    MD5

    0fa525c126633c3d6819484e79b577e2

    SHA1

    0abdd05abd9b0be7e09e89959e42e4d63d25692b

    SHA256

    16e992481eb889df06b6a3ed20a7c853ae7ed0457a64fb940fbfbc450fa22874

    SHA512

    fdd95e8ebf431aeea20c030395f44ea99e98e756ca0d3e1ea7998c9c5ba5f6bb40842ec03f8764b487d60e605563d534a9517e832f8921a10b462d51c930aade

  • memory/2544-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2888-9-0x000000002FCC1000-0x000000002FCC2000-memory.dmp

    Filesize

    4KB

  • memory/2888-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2888-11-0x00000000711BD000-0x00000000711C8000-memory.dmp

    Filesize

    44KB

  • memory/3032-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB