Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 09:58

General

  • Target

    739252b2e222fe91d2edfd5d1cc28ed7_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    739252b2e222fe91d2edfd5d1cc28ed7

  • SHA1

    bc20bf99c5350036de99351d9776bce432f43973

  • SHA256

    a578ae7a462a2fd261daeda50b0a72b4b372bee741e42e41f04c771579ba7276

  • SHA512

    3ce31a8dd262213be7002909bd3be340802dd3ebafe061ddb1030d1cf1e04f27098cab1036cac7ffea29b55a1cdb46d4ea33757b3d195a195f7aed412c2fd16a

  • SSDEEP

    24576:6YVweVtJL4qjvkdtUF1KgwgK6VZjpLKb7DiO9280R:6hCZs6MFgK6HpLGuGw

Malware Config

Signatures

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\739252b2e222fe91d2edfd5d1cc28ed7_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\739252b2e222fe91d2edfd5d1cc28ed7_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Users\Admin\AppData\Local\Temp\739252b2e222fe91d2edfd5d1cc28ed7_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\739252b2e222fe91d2edfd5d1cc28ed7_JaffaCakes118.exe
          3⤵
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1256-14-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

        Filesize

        4KB

      • memory/2252-0-0x00000000002F0000-0x00000000002F1000-memory.dmp

        Filesize

        4KB

      • memory/2252-1-0x0000000001CB0000-0x0000000001D99000-memory.dmp

        Filesize

        932KB

      • memory/2252-2-0x0000000010000000-0x0000000010127000-memory.dmp

        Filesize

        1.2MB

      • memory/2252-3-0x0000000010001000-0x000000001000B000-memory.dmp

        Filesize

        40KB

      • memory/2252-8-0x0000000010000000-0x0000000010127000-memory.dmp

        Filesize

        1.2MB

      • memory/2252-11-0x0000000010001000-0x000000001000B000-memory.dmp

        Filesize

        40KB

      • memory/2724-7-0x0000000000400000-0x000000000040B000-memory.dmp

        Filesize

        44KB

      • memory/2724-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2724-17-0x0000000010000000-0x0000000010127000-memory.dmp

        Filesize

        1.2MB

      • memory/2724-10-0x0000000000400000-0x000000000040B000-memory.dmp

        Filesize

        44KB

      • memory/2724-4-0x0000000000400000-0x000000000040B000-memory.dmp

        Filesize

        44KB