Analysis

  • max time kernel
    143s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 12:19

General

  • Target

    74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    74069a13d82ef37535b78882d1aff5ef

  • SHA1

    b66b0e7bc09370e46be4e5938881e42d004ee409

  • SHA256

    c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60

  • SHA512

    516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3

  • SSDEEP

    6144:Nu71bw8IbvtdgZ+k0ELRnuj83Q+5iGH25fIXID8dFjElHVDvo6qoS:Nu7SvLYIkve8QCiGHc1D8dEA6qoS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\XAPEHW.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2836
  • C:\Windows\time.exe
    C:\Windows\time.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" 60367
      2⤵
        PID:2820

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\XAPEHW.bat

            Filesize

            218B

            MD5

            44ccadbb12f4d062e8de016e247e2079

            SHA1

            0655092f5b4743abc8cd1a13da0727b21fdb73b1

            SHA256

            b454617a61a5058d0212f38cdcc6ee252a360b6998ccd17702d8a369d01e749e

            SHA512

            6f827d1ebe1c7bfd7840ee47593d8a7e2a9f57fca80e339ac96d0ad4524850ee01332791561dece308f4a674d8f447a77d64a69c7a820bc1ce6b7b9d1e62852b

          • C:\Windows\time.exe

            Filesize

            298KB

            MD5

            74069a13d82ef37535b78882d1aff5ef

            SHA1

            b66b0e7bc09370e46be4e5938881e42d004ee409

            SHA256

            c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60

            SHA512

            516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3

          • memory/2212-5-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2212-6-0x00000000001D0000-0x00000000001D1000-memory.dmp

            Filesize

            4KB

          • memory/2212-18-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2212-20-0x00000000001D0000-0x00000000001D1000-memory.dmp

            Filesize

            4KB

          • memory/2212-23-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2212-26-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2212-30-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2468-0-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB

          • memory/2468-1-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/2468-16-0x0000000000400000-0x0000000000495000-memory.dmp

            Filesize

            596KB