Analysis

  • max time kernel
    90s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 17:44

General

  • Target

    7512d66833016ba4444831e623d8785e_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    7512d66833016ba4444831e623d8785e

  • SHA1

    88a676d6d191c3e3daa16f5f39cb2cf6084228f3

  • SHA256

    937a0de2b80e8e2482408f2a9b6f3f225ddb644ca01827ee5cdc1a6c9a4486be

  • SHA512

    5c74368aa99b54a098efcfc98c8b5e383a39578c85c2dde10c13f5df7fdca4ee24e34c1acb3a2fd08cbd79dfbfe6f4915e7495033d603abd98707badb042048f

  • SSDEEP

    384:mrW/WbuGOuOoUr86iS4hYteCL7iChjMqHlnfGhjaOgTEhjEU+:tBoUdi+tB/iChQqFnfwjEN

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7512d66833016ba4444831e623d8785e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7512d66833016ba4444831e623d8785e_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3200
  • C:\Windows\SysWOW64\A480320A.EXE
    C:\Windows\SysWOW64\A480320A.EXE -k
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\A480320A.EXE

    Filesize

    16KB

    MD5

    7512d66833016ba4444831e623d8785e

    SHA1

    88a676d6d191c3e3daa16f5f39cb2cf6084228f3

    SHA256

    937a0de2b80e8e2482408f2a9b6f3f225ddb644ca01827ee5cdc1a6c9a4486be

    SHA512

    5c74368aa99b54a098efcfc98c8b5e383a39578c85c2dde10c13f5df7fdca4ee24e34c1acb3a2fd08cbd79dfbfe6f4915e7495033d603abd98707badb042048f

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    239B

    MD5

    b6d67be5f068eec05e64d351d045f247

    SHA1

    81e90e57fef68b1c34314f6c5d0f9cb4ab15094d

    SHA256

    5a06dc87c850c6ba55d8ca36884ca338ed5ec5ceb2fef46db3a5effb5dc25599

    SHA512

    4fdf6d7408717a01abc820cc8043044ad0944a9a99973b4d2e07d6441f212b30921f4e0f593c96d33e8bc6f7b571dacb472dbdc9ea31ad7903b3a3a5cd674ace

  • memory/2876-7-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/2876-12-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4316-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4316-1-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/4316-2-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4316-3-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB