Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 02:55

General

  • Target

    76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe

  • Size

    765KB

  • MD5

    76cc12369fda4754e4e977c6f280c8f9

  • SHA1

    b145575360eeec86c6d43b27dc5fd69a5d8ec88e

  • SHA256

    29ebb3bbce5a331bfcd55369030dd1d9686d6719c250d0346661e888f3cfb688

  • SHA512

    81d12a68769e80137485eb61b11fa74583a52a77831b5bfa8ccff2a5aa4682886b06633bf240d2bf20935c2ed3d4e4f2842f8a2aabadc6e07902a14de163d7d4

  • SSDEEP

    12288:R5kZMBLchejasXVijR9sYh7KYc0JEKknSIT6y3vZJJjb9/M5ytdt7LSMn9Q:R9LDasX8jDWMytz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\¸´¼þ Server_Setup.exe
      "C:\Windows\system32\¸´¼þ Server_Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\uninstal.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2696
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\uninstal.bat

      Filesize

      132B

      MD5

      f8453b629980dcd844bb6a2d051a06b5

      SHA1

      5b2e6122583c5e3abe4de9b85d96ded38d1dcf04

      SHA256

      92781ba41504370c3a859b35913e9c6f1bc7b3f13acdf06a6d607a79c499f737

      SHA512

      227c4671523542b206e56d950a636a0a79f5fabebb21d18ed0ee171d5aab4895ab7a0e5138f0dd35a323d9fdf574634f29ee917e6dc5e01a24953a3e0ab784c2

    • \Windows\SysWOW64\¸´¼þ Server_Setup.exe

      Filesize

      749KB

      MD5

      4291c6fcc182b48bd180575b01b38310

      SHA1

      af885b9507771de724c430d7e2f34e281fbf4da7

      SHA256

      22f806bc5e864f7dfbb34720a5358927581a35a569fa5a31042486d425c1f5db

      SHA512

      d4aa52bee14fd78d3ab994e03369ab9817a9c5ab91826dea2e1ac4000b49bcc813a0053d0726ecdbfa9af11ee5ac7a74f4a1a752a8d8703b026fd684729fa489

    • memory/2284-15-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2284-26-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2284-28-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2284-31-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2384-6-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/2412-24-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB