Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 14:21

General

  • Target

    746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe

  • Size

    459KB

  • MD5

    746bef01056a1e390de4dd05730df6a8

  • SHA1

    810da31e3cc8a0e801031e832a7ce41f80353a60

  • SHA256

    18f34e8fc05478f8d3eab56c4597b4c48f99b6ebcb74e3aed81febb3e9320329

  • SHA512

    9614f5d2a66599ed6c9a4f8ef3d4d2b616a826ad98ffdbece972630abb506ffdf1877bdd0150fec8f2a4dc9cae9f39f73d509024cfe7437be8200ddd017cdc0a

  • SSDEEP

    6144:U+7CcSJzOGT/2oHnsUTMyXxavz4+aG1Wj8FcNMcFxXz7Rj75SodSA95rZEu/VA8d:hCjmzcFh3SzA95Nx/SnMuvMcNo2q

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\746bef01056a1e390de4dd05730df6a8_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\Adufea.exe
      C:\Windows\Adufea.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Adufea.exe

    Filesize

    459KB

    MD5

    746bef01056a1e390de4dd05730df6a8

    SHA1

    810da31e3cc8a0e801031e832a7ce41f80353a60

    SHA256

    18f34e8fc05478f8d3eab56c4597b4c48f99b6ebcb74e3aed81febb3e9320329

    SHA512

    9614f5d2a66599ed6c9a4f8ef3d4d2b616a826ad98ffdbece972630abb506ffdf1877bdd0150fec8f2a4dc9cae9f39f73d509024cfe7437be8200ddd017cdc0a

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    96eb9c7c64fcda0ed7342728d2e90d91

    SHA1

    3b0d16a933f9ba01bc101db3e726d0da6795d164

    SHA256

    4a7985b7e758ea48bf2f68e19e8e590e334e6f293ec1fab938c39a654ae3c9d6

    SHA512

    06f44c908cca675337c8f90299bd0bb2b910a66fcbfe2072775e11e1d18e108cad843583354c2bccbbae5b1ae408e37c883c9b523fdbfacc3b54e82bbcc6c1d3

  • memory/1748-39766-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-23-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1748-47762-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1748-39712-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39714-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-16-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1748-21-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1748-39728-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39723-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39713-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39734-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39718-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39754-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39741-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39748-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39758-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/1748-39765-0x0000000001E20000-0x0000000001F20000-memory.dmp

    Filesize

    1024KB

  • memory/2144-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2144-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2144-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2144-14-0x0000000001FC0000-0x0000000002034000-memory.dmp

    Filesize

    464KB

  • memory/2144-15-0x0000000001FC0000-0x0000000002034000-memory.dmp

    Filesize

    464KB

  • memory/2144-2-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB