Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 20:56

General

  • Target

    75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    75b094a821943d047cad043a3f0b27e7

  • SHA1

    15f25be6f85e754ea76405344b97bfa26ecbc699

  • SHA256

    79bfd2bbf93caba1ce89ef66b7505d7e24782afd5b4dd571fb9b6fdbee3b0e24

  • SHA512

    7f9fa2ba9aa63d35a912e7b431e235226b63ba28eddaf5df4392841177718337cf70ea8a45c44e6ae001b754248818c158526219f985ebb4e530c80820aa8636

  • SSDEEP

    768:+hA+1fvddWwNqP4sULADFDvjbmjyWVz9INfAWKs65P9vuWyS6pZ/blOGqFbY:813Z02Gj1WVz9gfAi65P9v5Olmm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\75b094a821943d047cad043a3f0b27e7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c tr.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 164
      2⤵
      • Program crash
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSINET.log

    Filesize

    73KB

    MD5

    53e841ab3ab431a3a1a36e147d264233

    SHA1

    f39dd93436c0e3b0968e5325f21d575224df0e25

    SHA256

    d55b29a6ee56f00c37f29671785ad51f074deb760eb0f51e612ed2b03865019e

    SHA512

    a4a895e5d0a26533566be7469e5a2e894ddbfe518636639e5df3435ddbce6dcc326d9d7a9c8c58d5a671dac4c4276ef348892a8fa7b7730585b66da3ccdf7966

  • C:\Users\Admin\AppData\Local\Temp\tr.bat

    Filesize

    154B

    MD5

    2b69ec34a7b68a5b34ffc924adf0b556

    SHA1

    c5683c66731b217fc0b7d65c7a144bebb534ae67

    SHA256

    9305742c82ebb8abea779147bc62552f3a0473a6e7bb2b41722e05b5633aed2c

    SHA512

    fd515767f9959ecdad264c7bf89def06cb8e471a38f7b7b18e908081c962864575fb1d722c2a22047c0c28069407f5126041a7e7e8b4e1b5be2bbb76efd9a19c

  • memory/2680-10-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/2680-20-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB