Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 00:15

General

  • Target

    824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe

  • Size

    281KB

  • MD5

    824b23711bbb4133e3bbb2379397f72b

  • SHA1

    d28ea4c1b8630c6c367c4dfed9e782c778bb9d78

  • SHA256

    43e5457fb74bd1f7e2a79eb949519cfe8019fc55e7b57cebc81d89bc9cf9d2be

  • SHA512

    1fe6a72e63fa2e19202f2a4dea2ba85e60b6c08498dc3b02ec8f41cf534ae21b4e87aebfdbebb93b1355d6478dc32ae72b2b9ded581db2ba66c4f542932056e1

  • SSDEEP

    6144:imQ8Ufw/M/eUfTWOP9uo51oe1jfohAjLdO9E1vO/hD3lMZBperIh+8:cw/lUb7oeCovO/ZVMZBpec

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2068
  • C:\Windows\SysWOW64\svohst.exe
    C:\Windows\SysWOW64\svohst.exe -NetSata
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Deleteme.bat

    Filesize

    104B

    MD5

    2eec7e3ae21b6acc8fb8cf0a2f7323aa

    SHA1

    0e6a8a87b7c2848ffec860a6955a44a2c166ad9b

    SHA256

    78d9742426f406d30f8379f240e595b8ab937b48bc9b0b5099e7e9ecfaa9fac2

    SHA512

    e13fae2b008a4eb4b88ade4e516d8c8d2521c1c88b53fd4f62863673ade296e708c5b128f1b5b79b18d78f0ed3c94a892207841b664c057a2617ab97aa8bf281

  • C:\Windows\SysWOW64\Deleteme.bat

    Filesize

    212B

    MD5

    3c9257327eed407c9b293308aa576bae

    SHA1

    325e3ac915b4fc0bb3bacb12933d89023b4be073

    SHA256

    200714c5a0632cc8f3337c408a4f633ba8214fd7e31e014933c4aefe001d597d

    SHA512

    085521046869111b77bdfccf83e13971f8d9e125b62847d8400627331c2e89bd2c507b6499e7dd6a5b2526530c496dd610956b0cba0ca3ea2485fba3c447d266

  • C:\Windows\SysWOW64\svohst.exe

    Filesize

    281KB

    MD5

    824b23711bbb4133e3bbb2379397f72b

    SHA1

    d28ea4c1b8630c6c367c4dfed9e782c778bb9d78

    SHA256

    43e5457fb74bd1f7e2a79eb949519cfe8019fc55e7b57cebc81d89bc9cf9d2be

    SHA512

    1fe6a72e63fa2e19202f2a4dea2ba85e60b6c08498dc3b02ec8f41cf534ae21b4e87aebfdbebb93b1355d6478dc32ae72b2b9ded581db2ba66c4f542932056e1

  • memory/464-0-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/464-1-0x000000000047E000-0x000000000047F000-memory.dmp

    Filesize

    4KB

  • memory/464-2-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/464-15-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2700-6-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2700-7-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2700-8-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2700-11-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB