Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 08:42

General

  • Target

    7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    7356ea2db3e8937ffc9ee843c86cc9de

  • SHA1

    7f340181e5797be63608a61c338bb31ab84724cc

  • SHA256

    5c7449880a065072298ab9e1cb2bda484e56e4c6fd2348fe122f6a030017315c

  • SHA512

    7f574e5214132f3cae1d8474ac19e3d57604b6f47661f364dd5b1e713154f8d39b13f84c5c3fefaf489afbee07a6aec6f4a1865d17fbb50d7c01ecfe6da7bd97

  • SSDEEP

    3072:ToBBTxiK9TnPc/6sRH9N44jGvRdt4FC4pLthEjQT6j:TYBTxiKFPc/6yrw4ckEj1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7356ea2db3e8937ffc9ee843c86cc9de_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\TRNWJG.exe.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\windows\TRNWJG.exe
        C:\windows\TRNWJG.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\TRNWJG.exe.bat

          Filesize

          58B

          MD5

          b96d06aad800d58c8b5c61da0b5f56f5

          SHA1

          a91b8ff67cadf1dcae74884f46481b9c2c585d3a

          SHA256

          d937eb68a01bdbde0d62f2783bbe2585df657fb46a96e5d4c6f40017679c9d7d

          SHA512

          8cd1d9c44b9d630260d73893c2be63ef15ccfff6518c39dee7626fdc2b0f7e74cc023b6773ecea05d9c4caec0350f13b72aab2a351d1d62431ff4bbdab86e556

        • C:\windows\TRNWJG.exe

          Filesize

          208KB

          MD5

          051e26f00b6cbfdf75bc257376b8b2ac

          SHA1

          b0a9d503ef5d0b30698e1c2ef5ea0b67229a38c5

          SHA256

          d7904a1e864cc16a5919791e49fc3fee5d0d3712b83c0f1b582130e482a88871

          SHA512

          6b00aab61c8fa83f2d3fa8205c3c83fa00f7778b15fa97200b224bc9ced27e6d2d8785e6cd88fd8ece2926129e4e78f43d9ae6f84f9fd1ce3c51d90bfee2cadc

        • memory/2368-0-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2368-12-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2664-17-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2664-18-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2824-15-0x0000000000130000-0x0000000000168000-memory.dmp

          Filesize

          224KB