Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 21:16

General

  • Target

    81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    81c688c65a97deceada9c671d3df6dfd

  • SHA1

    218b50398f9d18c6d8d19c9b0a881b001eb82827

  • SHA256

    a18cf94fa7404427a3587a12401247588203fd8fefe82c2ad5c9e796a8aa911d

  • SHA512

    f2c0273e24ef53d82dc82015eba3df60a14c822cde636b770c08f30d24815cd2daf9e6d91001a396379c2f2d6563b261bb90d6daf9320031003589f19cfd26c1

  • SSDEEP

    49152:qa9EGEPc+ISjWcJGssRhszyAEt+aumSlgGBzVTF+cGRxOCn1wC+g8db/5IBuJ+Ue:D9EGEQphDRhszTEt+aujgOv+cGRYqF+W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\is-LEFIS.tmp\81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-LEFIS.tmp\81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.tmp" /SL5="$30142,2730170,77312,C:\Users\Admin\AppData\Local\Temp\81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2272

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-61KN2.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-61KN2.tmp\itdownload.dll

          Filesize

          200KB

          MD5

          d82a429efd885ca0f324dd92afb6b7b8

          SHA1

          86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

          SHA256

          b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

          SHA512

          5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

        • \Users\Admin\AppData\Local\Temp\is-61KN2.tmp\psvince.dll

          Filesize

          36KB

          MD5

          a4e5c512b047a6d9dc38549161cac4de

          SHA1

          49d3e74f9604a6c61cda04ccc6d3cda87e280dfb

          SHA256

          c7f1e7e866834d9024f97c2b145c09d106e447e8abd65a10a1732116d178e44e

          SHA512

          2edb8a492b8369d56dda735a652c9e08539a5c4709a794efaff91adcae192a636d0545725af16cf8c31b275b34c2f19e4b019b57fb9050b99de65a4c08e3eee1

        • \Users\Admin\AppData\Local\Temp\is-LEFIS.tmp\81c688c65a97deceada9c671d3df6dfd_JaffaCakes118.tmp

          Filesize

          710KB

          MD5

          02af54d9e8f925a10e2fbdd119e4c8d2

          SHA1

          0457bb1f89d2596266634d5ae792257086caf662

          SHA256

          53dbf2debbb7811846feba931a246ec87cb1e614389760b40b5ac0255eac04a7

          SHA512

          25c05a8be8cd14981fdbc6d5f3e729aa0fa6b05e2500c38d2f935c2cec828da65bc9ac01cc6c11b0a3fb917321534b99f2007851658370594282cf2377084438

        • memory/2272-8-0x0000000000400000-0x00000000004C2000-memory.dmp

          Filesize

          776KB

        • memory/2272-18-0x00000000003C0000-0x00000000003FC000-memory.dmp

          Filesize

          240KB

        • memory/2272-26-0x0000000000400000-0x00000000004C2000-memory.dmp

          Filesize

          776KB

        • memory/2272-27-0x00000000003C0000-0x00000000003FC000-memory.dmp

          Filesize

          240KB

        • memory/2316-0-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2316-2-0x0000000000401000-0x000000000040B000-memory.dmp

          Filesize

          40KB

        • memory/2316-25-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB