Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 10:45

General

  • Target

    73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe

  • Size

    178KB

  • MD5

    73b7ddabf675ca2d58a79b3edf45da32

  • SHA1

    ae6fc7ea40271f1805a9c435cd37ef93f26eb478

  • SHA256

    6ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b

  • SHA512

    2d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed

  • SSDEEP

    3072:u0Gox2PD7tC6PN5k/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPGWqGU/n6CbzGcBIMHIGl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\Bnynua.exe
      C:\Windows\Bnynua.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:3856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Bnynua.exe

    Filesize

    178KB

    MD5

    73b7ddabf675ca2d58a79b3edf45da32

    SHA1

    ae6fc7ea40271f1805a9c435cd37ef93f26eb478

    SHA256

    6ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b

    SHA512

    2d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    390B

    MD5

    23f7c0ec479c225594c0f582441703b0

    SHA1

    4aee406a0ffd6023f1c1b70ce4b2f1067aa1d8fa

    SHA256

    695c2221ffe4bf8c363a205921a38bec86ce30a68cd736fba35e93df7d88dbb7

    SHA512

    6137067eca36a1e26a34d70be5ed0038db9c04b2757dc1d137a2d35022e2b1d874e1c9825a1e1eed5aae03215b4e56c9b94ecd6c468b8caf09cd7757e2c11068

  • memory/3664-1-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3664-0-0x00000000020D0000-0x00000000020E5000-memory.dmp

    Filesize

    84KB

  • memory/3664-26981-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3664-10-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-8-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-9-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-124920-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-124923-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-124925-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-124927-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3856-124931-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB