Analysis

  • max time kernel
    18s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/07/2024, 01:23

General

  • Target

    04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe

  • Size

    275KB

  • MD5

    04c815166ad8fa7b4a80017fb6770296

  • SHA1

    b28d4b66251c25bd93e450bee939652c7a3241d2

  • SHA256

    7e2da686b350d7ec646ca94b3c00b38d64ba8faa3a059f407a67a4cab261b49d

  • SHA512

    0a54d669b5ab856f036ad94e3506b03918e90086403497124a00b1cd116b7a1b639bbc5824ebfb0adec94eb6830336519f53d5c067df9103be056b95d63808d1

  • SSDEEP

    6144:XUZyaM83nLbxKVJ3nCMkQe5HZAsHFZlxz:5lgsHyMqLHFZlxz

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2060
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devC62E.tmp!C:\Users\Admin\AppData\Local\Temp\04c815166ad8fa7b4a80017fb6770296_JaffaCakes118.exe! !
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3664
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devC62E.tmp!C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4240

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\04C815166AD8FA7B4A80017FB6770296_JAFFACAKES118.EXE

          Filesize

          275KB

          MD5

          21f207a22599f995cdfc94eb07ab1532

          SHA1

          842f3da10d8463c303decf938b6cb58b1fd830e2

          SHA256

          cf89a69f89da511ac32875a7e62dd4daf2501aac2965a4340cd1034da24b72e2

          SHA512

          958ba39c7b6a8bd2faa0301e8c840b04dfe343581b37251cd7262c4b1a8f76230bf93da64da48c25e4cad1c524550558057ec9d6204e90756cdff2435c4d4a1c

        • C:\Windows\MSWDM.EXE

          Filesize

          39KB

          MD5

          f518dffaf1cdc2a1bc025a7703010dea

          SHA1

          b63ee1f346d540bdc79a335894794b7878e75cc3

          SHA256

          dbb3d78a784cd556b873566eb869699eb9f11b9c4142c17ca7e48fd408b5d122

          SHA512

          25b5c2dc6819a4d90f79eecaa5e1cda47942c9d5b1a923710d9344dbe7ab47c2c3371fd1ff79dfdd95ac2a3d09a09bcebf4695b15cea6933e5a90936c365dab7

        • C:\Windows\devC62E.tmp

          Filesize

          236KB

          MD5

          d095376682210d6ddcaeb636500eb0cb

          SHA1

          f3ba099deee863c83f78e1814eb345b56560b11a

          SHA256

          06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

          SHA512

          546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

        • memory/808-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/808-8-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2060-10-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2060-25-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4240-21-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4440-11-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4440-24-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB