Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 20:29

General

  • Target

    7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe

  • Size

    378KB

  • MD5

    7598fa8e511f62c71f26fe400d59274c

  • SHA1

    8c58c0ab83af4433c5fbdd44cca1a9f457393500

  • SHA256

    a1f3517e788cdcd858100b2a9d8150af35ded70680f1ef1035073c16d1b42ad0

  • SHA512

    e3f9f35f281db8bf7bde4fc1f61cc8a0cc8876244ac78c79333459c9c699ad2af4e2da75224ab8100dcceea322ea92a717efa435e03fbffc68fc96dcc5040a88

  • SSDEEP

    6144:hWSbdBjwzR/7LisOhbUwls8fH7SCl9PM75hE71UTU3OmgJwUzRi4GOVHtNYlq22A:hWSbd5SohbUwlsC9k75hE71Ue+Xz04Gh

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\uninstal.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:588
  • C:\Windows\SysWOW64\doc
    C:\Windows\SysWOW64\doc
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\uninstal.bat

    Filesize

    150B

    MD5

    fd4f4346428fa5aea1ac0f1f548fbf35

    SHA1

    e6e369469eb079cf75a901ed6e169a3a3f4d76b3

    SHA256

    a9a95af8b288704e17f39bd714c8339538e284aa7dbdfb3788cf868e21677bc4

    SHA512

    22a13594e51499ac93b763ecb616bfecd00c47e68ab8a8d308d11bf8ad09b8a0d14c98f0096f1639abbf5010b04f93512e7c31f5ff01d67f81ad94dd74d347ed

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\d.exe

    Filesize

    743KB

    MD5

    64865b77792442e33daa2ffb4bf22010

    SHA1

    78b3fd6d221e93f7ff277ae4fc3386064382f60f

    SHA256

    a1b0b9b080be15800d865e7c6b5438ce13c872d12fa346f322567d725aa18bcf

    SHA512

    6edb226707128dd1798b42fc538e1b88f36363d7ce704d12cec9f7ffefaf4a8328b6463bc6dc3e71bbd4b7ea59571a2b7d3dc5d3fa3aa024274487756da7ac0d

  • memory/472-14-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/472-16-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2384-24-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB