Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 16:53

General

  • Target

    74e85de83b3ec4c808dfd427deaf4aa4_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    74e85de83b3ec4c808dfd427deaf4aa4

  • SHA1

    ce7a595c866312e5b42fea24be23722b44b2c939

  • SHA256

    443341bcb3ef531c4aa509a34524ce684090fb7976a7022dc8d8c358f6c388c8

  • SHA512

    a7a808c6556b1dfe10458074c37090d9155d643f27170f0fbf5bdf751fe1860871b1dda4956250a217804c9e9899292bdfac543aecc11fc0a6309399e444e1ef

  • SSDEEP

    6144:VYjOVQdWS1/j3xnfF4oadZ6uG5riqzDCKsJK83VaTUkpKHjNN:3VQl1bB5uGtNDCKyKiIon

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e85de83b3ec4c808dfd427deaf4aa4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74e85de83b3ec4c808dfd427deaf4aa4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\ecad.exe
      "C:\Users\Admin\AppData\Local\ecad.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1052
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\melt.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\ecad.exe

    Filesize

    298KB

    MD5

    74e85de83b3ec4c808dfd427deaf4aa4

    SHA1

    ce7a595c866312e5b42fea24be23722b44b2c939

    SHA256

    443341bcb3ef531c4aa509a34524ce684090fb7976a7022dc8d8c358f6c388c8

    SHA512

    a7a808c6556b1dfe10458074c37090d9155d643f27170f0fbf5bdf751fe1860871b1dda4956250a217804c9e9899292bdfac543aecc11fc0a6309399e444e1ef

  • C:\Users\Admin\AppData\Local\melt.bat

    Filesize

    137B

    MD5

    32c26d4fc828b3b8f63e8b6f15d217a7

    SHA1

    0e8badb3101365445eead2739a53f801411e8758

    SHA256

    57fce0b35641be03711548157cf6fc61f0668759892bb4921d6bf7d838b8566a

    SHA512

    6b5e059796518ad8126d90b6aaafbdf765c0fe7e91aa1f8900a70fde162c3efc33906ff3e113f7fbf68a24d76c8abfabc0b03580dcd912a9b7befa129a6fae33

  • memory/1052-19-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1944-17-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB