Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 02:51

General

  • Target

    82c50f4081cd3790d1ade5dd99c9f52b_JaffaCakes118.exe

  • Size

    93KB

  • MD5

    82c50f4081cd3790d1ade5dd99c9f52b

  • SHA1

    3f6a1f00e280cda2d5c230b446a54adc7e822d9a

  • SHA256

    c8dd70fce0f38a2a4e131fb137eaf271f6ca1816a801e36141e691f4f21b3159

  • SHA512

    23db8dfc0a7c3165b0c25d099a010f5c739aa67f89e77f6f63a01eb9b186a5c55a5dae6827d3c08b88808d92904b1c316c545e23d3af7b5d0fce47ae4f78907a

  • SSDEEP

    1536:dWW0MRMx1rR9y6xVxXzMAnZIL5yY7bAWfL+hZ4Tc5L:dWW0SMx199y6xDDMYcpnj+oTc5L

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82c50f4081cd3790d1ade5dd99c9f52b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82c50f4081cd3790d1ade5dd99c9f52b_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\SysWOW64\drivers\rsvp.exe
      C:\Windows\System32\drivers\rsvp.exe /waitservice
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\MICROS~1\sessmgr.exe

    Filesize

    93KB

    MD5

    82c50f4081cd3790d1ade5dd99c9f52b

    SHA1

    3f6a1f00e280cda2d5c230b446a54adc7e822d9a

    SHA256

    c8dd70fce0f38a2a4e131fb137eaf271f6ca1816a801e36141e691f4f21b3159

    SHA512

    23db8dfc0a7c3165b0c25d099a010f5c739aa67f89e77f6f63a01eb9b186a5c55a5dae6827d3c08b88808d92904b1c316c545e23d3af7b5d0fce47ae4f78907a