Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 13:44

General

  • Target

    744e4eb6c8f21fd9d9289253ca0a39a2_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    744e4eb6c8f21fd9d9289253ca0a39a2

  • SHA1

    581eb76e8cf9ec0d8c3beaa45ccf9b7b9f76f081

  • SHA256

    c3f9be30085f8a6a334ab6757c4337c91067537409da17211b7c15520de2806d

  • SHA512

    7a4eb8369bfe963f0e4fa7cfb5ccf44a06b21cc9bc95ec67cb86f0f2b234a01ebfb6a23e13a4557d3e0731c58851ac000d35d598d4f0060b1a7e783e2db20896

  • SSDEEP

    384:Xk3RPRZLnRcrr2hBapX2qVRc3OSWbpy8lXxcyvW01Y:XCN/Gd5VRc3PWbc8Rxcye02

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\744e4eb6c8f21fd9d9289253ca0a39a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\744e4eb6c8f21fd9d9289253ca0a39a2_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\BD47.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\BD47.tmp.bat

          Filesize

          207B

          MD5

          debd717a6044bf9d68a8de1090280aef

          SHA1

          eb257460cc15926cda390a0d7f4352d8d92af392

          SHA256

          4976ba7da126192415b0def2513e1a58e7c44b1a20b94573cea846a2488d9404

          SHA512

          46d74e925c335c1d606f29b99a1fd4064f5af3a02f8b17fef829f2fcb7bea14ef713482ee4e0f453023c0d3df7699ece1c7489e6c0b93e5682335127bb992ccf

        • C:\Windows\SysWOW64\dispexcb.nls

          Filesize

          428B

          MD5

          ff77e53159f703a78b1e930f0262e14d

          SHA1

          7d968e2138db42637c3210f26aec04d40add885b

          SHA256

          218718ded88d55e369f2c21655e8b6c2c86d785ed72ed0bca0579a53fb86552a

          SHA512

          3ac09c4a9ba32e6357af2e98c38b0a0c2ff8c6c7b9633575c8ad90ab650c46be50bb83dfd8faf34319e9dc73503891e5cf86c248cb6f6c02879f70e3d89ef765

        • \Windows\SysWOW64\dispexcb.dll

          Filesize

          987KB

          MD5

          2061d654920d6b6e94bb87c6b7d2c282

          SHA1

          97e5fcc6df3e3f60899292b6ef23abb4a7d817a6

          SHA256

          ed870248d79cdae7cf9581d7f0ca402e98610d1ef27ff03f6cc3b990494b0270

          SHA512

          b260e09a405d8349806169508db6e4353aa978c4ca345ae5e85b99285a65fb547360173d005102c423012166275d728efc051eb47e0f077aa20c9bed13848305

        • memory/2708-16-0x0000000020000000-0x000000002006C000-memory.dmp

          Filesize

          432KB

        • memory/2708-25-0x0000000020000000-0x000000002006C000-memory.dmp

          Filesize

          432KB