Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 03:08

General

  • Target

    82d1a407acd8ff5026e17ab12e4faba0_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    82d1a407acd8ff5026e17ab12e4faba0

  • SHA1

    207cc289a6bd511bece65470ca7c781e1ca5c05e

  • SHA256

    ead21dfbf6921f18ca222a970de0efbd3963d198e375704ea9f383bc51ed4204

  • SHA512

    de3d3a161bcf49510c72bdf0734301623534541d89e0e7302d154d87483ea6cf8d8fa808f6c4f2bf9bbd001be5605b76ba922e1211dc5a224c284a98babd1132

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN7FYat:Dv8IRRdsxq1DjJcqf8FYA

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82d1a407acd8ff5026e17ab12e4faba0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82d1a407acd8ff5026e17ab12e4faba0_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp546A.tmp

    Filesize

    28KB

    MD5

    3acfd4dd92539f15e3e558e596711b68

    SHA1

    f11294c11fec2a676f672c1e5811ee9a7307314b

    SHA256

    134731f76357121c0a1de757a94355b3ae7633b48c4a753ec3345b81828c6af6

    SHA512

    2692ca0888ebd564fb6dc64f4f8703a095a9afcae81076b5292267db3f63b6827bddc6a0ddf69d6b11a1ecb485bcff4ec4252d8639b36ba62ff20ed9a550a779

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    bf75cb924c9afaeb9c72674318024cb4

    SHA1

    9996161f72b163cf070d4050428c13a428fbbf4d

    SHA256

    29f7a8d393ebedaf8c17c8dccb89030c6ccb741c2172531bf04cae3dda2b42ec

    SHA512

    253dd8e54615909a9c794b992594957f255e74f9d1b6980ea9e3a0bcb41e17dc2350f6dd9f42188ffd81e98da67f8371b34e0487198b059b257d1c5b70808a57

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1712-85-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1712-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-3-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-90-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1712-83-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-78-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-74-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-72-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1712-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1712-47-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1884-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-75-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-79-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-84-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-86-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1884-91-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB