Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 18:28

General

  • Target

    7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe

  • Size

    177KB

  • MD5

    7537a43b8f9cce1e0d3543d6096a2632

  • SHA1

    d4c7171257af5a23a4af25029e1b157d1a1ecbee

  • SHA256

    8361b0d803cadbec4c2244e9298f30a9ebe611e86df3f1fb6898726c2beefd12

  • SHA512

    2f4f5db2dec892ec2507fa641e933726d14ca2b8015b8458d7e5de855dfa7cbe2e956256691063e599bc7fb4af7b595a8d366098c33f7f641d708cd2383ac096

  • SSDEEP

    3072:/mTumYf69yfyRkooAVR+JfTLHrtDdzig8zCdQ27tT9rpjVd:sQVdoofP5p6zKQ27tTjJd

Malware Config

Signatures

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:880
      • C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\7537a43b8f9cce1e0d3543d6096a2632_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:4468

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\1183.1F7

        Filesize

        996B

        MD5

        a63c20ea52b8d8e34581318836a3166e

        SHA1

        cda305d6ef1f6c9713d87ea728efdf82747ab971

        SHA256

        28f23a6d0adf6967ca33844094a18bea2891fb799cee6bcc02ea6045cf33754d

        SHA512

        97e64b9f3af96ee8f584d7749bc3414fe603ae16aef0cd53f17c4d8bbe2973924640b401efbd693bc39c0e6ec0e4b2d8ac61f076555256ddf5c51a376cc6e38c

      • C:\Users\Admin\AppData\Roaming\1183.1F7

        Filesize

        600B

        MD5

        921aa032e3c7329edb67d04b6231560d

        SHA1

        3951c70b6f835962e327be96ea4d41a0d7e5e469

        SHA256

        efb5a364a1fb259ec278af12717254cd26453539c75bc165e409d9280fa62f56

        SHA512

        54711c187b4c310b170f4d331119034f94e48484203e3787bf8285f2992e024dc2ad395aded2c06286879d156cc51e235aa3954b0a09061adc281ef6cbc2f7a8

      • C:\Users\Admin\AppData\Roaming\1183.1F7

        Filesize

        1KB

        MD5

        f382b57da15827b6ee230ce2b6f79cc5

        SHA1

        b3a0708cd16a998812ad061c1a5922769e69ec2e

        SHA256

        ac9ea70a0a32c83da92576e4770d700f9c934eb87da5a6642d7d84e0a138fd8c

        SHA512

        791384c45310185c5f5bf512cb7125640e661e0635badf70daec7ae39c307ec66ff8dd5c2a5290486195782ec91f7b10d44bea131d620fb78c9bdac6325da735

      • memory/880-12-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/880-11-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/880-13-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/3656-111-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/3656-1-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/3656-45-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/3656-180-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/4468-107-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/4468-108-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/4468-110-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB