Analysis

  • max time kernel
    8s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 01:23

General

  • Target

    04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe

  • Size

    275KB

  • MD5

    04c815166ad8fa7b4a80017fb6770296

  • SHA1

    b28d4b66251c25bd93e450bee939652c7a3241d2

  • SHA256

    7e2da686b350d7ec646ca94b3c00b38d64ba8faa3a059f407a67a4cab261b49d

  • SHA512

    0a54d669b5ab856f036ad94e3506b03918e90086403497124a00b1cd116b7a1b639bbc5824ebfb0adec94eb6830336519f53d5c067df9103be056b95d63808d1

  • SSDEEP

    6144:XUZyaM83nLbxKVJ3nCMkQe5HZAsHFZlxz:5lgsHyMqLHFZlxz

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1484
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devC5FD.tmp!C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2780
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devC5FD.tmp!C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE!
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2912

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe

          Filesize

          236KB

          MD5

          d095376682210d6ddcaeb636500eb0cb

          SHA1

          f3ba099deee863c83f78e1814eb345b56560b11a

          SHA256

          06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

          SHA512

          546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

        • C:\Windows\MSWDM.EXE

          Filesize

          39KB

          MD5

          f518dffaf1cdc2a1bc025a7703010dea

          SHA1

          b63ee1f346d540bdc79a335894794b7878e75cc3

          SHA256

          dbb3d78a784cd556b873566eb869699eb9f11b9c4142c17ca7e48fd408b5d122

          SHA512

          25b5c2dc6819a4d90f79eecaa5e1cda47942c9d5b1a923710d9344dbe7ab47c2c3371fd1ff79dfdd95ac2a3d09a09bcebf4695b15cea6933e5a90936c365dab7

        • memory/1484-15-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1484-32-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1748-31-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2308-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2308-12-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2912-29-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB