Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 16:16

General

  • Target

    78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe

  • Size

    374KB

  • MD5

    78c145aa6937af9ccd855169e97adab9

  • SHA1

    a73ace4b512c7923aea1b4045faab44b723a6103

  • SHA256

    6d3415233b968c7d3b908d95ff649507097d8b7e0fffcfb5e42716b96cafcf2e

  • SHA512

    295952331ac2b8c3494b02d2bb461eee346d30b3723d86fd8f430832009fe7180fbee61e0af58bcbcb1a0c1c8eb1be38b6e4a23a8f8f030eb4320f4a936924e5

  • SSDEEP

    6144:unBgzvrz0hrinKXkkJteVHal1KAepkxPgsnJ1v1ukCKGRPqzb4LObsteKleG/Q4t:Zzvr4hFJtmAKjpSPn98KMP44LObme2e

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78c145aa6937af9ccd855169e97adab9_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\YUMQOU.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2376
  • C:\Program Files (x86)\pemote\start.jpg
    "C:\Program Files (x86)\pemote\start.jpg"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 55548
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\pemote\start.jpg

    Filesize

    374KB

    MD5

    78c145aa6937af9ccd855169e97adab9

    SHA1

    a73ace4b512c7923aea1b4045faab44b723a6103

    SHA256

    6d3415233b968c7d3b908d95ff649507097d8b7e0fffcfb5e42716b96cafcf2e

    SHA512

    295952331ac2b8c3494b02d2bb461eee346d30b3723d86fd8f430832009fe7180fbee61e0af58bcbcb1a0c1c8eb1be38b6e4a23a8f8f030eb4320f4a936924e5

  • C:\Users\Admin\AppData\Local\Temp\YUMQOU.bat

    Filesize

    218B

    MD5

    132361b1051f202fdd6f0ea73a67edce

    SHA1

    4ee5da483570d643cfcf351c886d973063eca0b5

    SHA256

    176111b3ab133679cae5f7c194a0a80dd20ef28e22468b5fa855442a1f790717

    SHA512

    46cf369fe2236ecf9b87d7366b9c1a72e971f37e6400d31fdc734e855eb17c38735dd66c16b1fd0732561b756ae11055c4f68c45a3452d23612bce70b4288667

  • memory/2188-15-0x0000000010000000-0x00000000100B7000-memory.dmp

    Filesize

    732KB

  • memory/2260-0-0x0000000010000000-0x00000000100B7000-memory.dmp

    Filesize

    732KB

  • memory/2260-1-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2260-17-0x0000000010000000-0x00000000100B7000-memory.dmp

    Filesize

    732KB

  • memory/2264-5-0x0000000010000000-0x00000000100B7000-memory.dmp

    Filesize

    732KB

  • memory/2264-6-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2264-19-0x0000000010000000-0x00000000100B7000-memory.dmp

    Filesize

    732KB