Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 16:48

General

  • Target

    74e4fc2c64660c843366f134d80cff34_JaffaCakes118.exe

  • Size

    297KB

  • MD5

    74e4fc2c64660c843366f134d80cff34

  • SHA1

    3fc586192e09644c8d216f7d655cfbc719007992

  • SHA256

    0409f5b9405121edabb00ad6dc94d6429399be213f2513027817378f775a8d86

  • SHA512

    6e01fdc47fced82d784121f5aae2f94f32ca9bff150e43388b5655cc029575017e986dcd27e36c4aecb793b8f3b1c8adc3655e824f5f60d0bb34dbc57341bb62

  • SSDEEP

    6144:LvDB+sclf76BsT+pt4WbMZVnFM80vWReLGNP376PlcwWgMYN:LLB+9lf76GGsV3ReLiKqgbN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e4fc2c64660c843366f134d80cff34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74e4fc2c64660c843366f134d80cff34_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1748
  • C:\Windows\WinXPs.com
    C:\Windows\WinXPs.com
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\WINDOWS\SysWOW64\svchost.exe
      C:\WINDOWS\system32\svchost.exe
      2⤵
        PID:1712

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\WinXPs.com

            Filesize

            297KB

            MD5

            74e4fc2c64660c843366f134d80cff34

            SHA1

            3fc586192e09644c8d216f7d655cfbc719007992

            SHA256

            0409f5b9405121edabb00ad6dc94d6429399be213f2513027817378f775a8d86

            SHA512

            6e01fdc47fced82d784121f5aae2f94f32ca9bff150e43388b5655cc029575017e986dcd27e36c4aecb793b8f3b1c8adc3655e824f5f60d0bb34dbc57341bb62

          • C:\Windows\uninstal.bat

            Filesize

            218B

            MD5

            1b2d56017deb43118ce74d10d48d3218

            SHA1

            8713048853b2bb3d69799bb05d187950c2ca1cf9

            SHA256

            1def6b4d3f961cd7f9dc5fde6e505486011a9c5f533e304aa32da2bc8b9b3219

            SHA512

            28a33b6a8a1870baa564b21d3da1de3422933fd16f3bc0080071e9c5f0b2404cff2f4cc2665f5f1991ab0582da3ac71c547b738f8fbea662e3e22803c7077ff1

          • memory/1712-19-0x0000000000400000-0x0000000000506000-memory.dmp

            Filesize

            1.0MB

          • memory/1712-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1712-21-0x0000000000400000-0x0000000000506000-memory.dmp

            Filesize

            1.0MB

          • memory/1956-4-0x0000000000270000-0x0000000000271000-memory.dmp

            Filesize

            4KB

          • memory/1956-1-0x0000000000270000-0x0000000000271000-memory.dmp

            Filesize

            4KB

          • memory/1956-0-0x0000000000400000-0x0000000000505E07-memory.dmp

            Filesize

            1.0MB

          • memory/1956-22-0x0000000000400000-0x0000000000505E07-memory.dmp

            Filesize

            1.0MB

          • memory/2552-6-0x0000000000400000-0x0000000000505E07-memory.dmp

            Filesize

            1.0MB

          • memory/2552-7-0x00000000002E0000-0x00000000002E1000-memory.dmp

            Filesize

            4KB

          • memory/2552-8-0x00000000002E0000-0x00000000002E1000-memory.dmp

            Filesize

            4KB

          • memory/2552-24-0x0000000000400000-0x0000000000505E07-memory.dmp

            Filesize

            1.0MB