Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 21:27

General

  • Target

    839b109a049701939875ba44b8fdeca6_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    839b109a049701939875ba44b8fdeca6

  • SHA1

    9098bed3de44397099201a9380b49d4379116fdf

  • SHA256

    e43c26f92952a7ffd2b0579714cd79384feaa9701aeef3bd9b04bc7bc1dc7f77

  • SHA512

    e1a2bcb4498be3ddd3a7457c47c0aecf6aa183c1111d25095f7c5968d5c30dcb29461e69373c7eaac3f73461213bfd6fde214c8979d5c7115e4fddb7426f5133

  • SSDEEP

    768:uGl/rUnTL65yGim4pYSZhER8QkOwAsZyU4FLk/0KtT2a8jmr83jkcM2qYrnLcjbz:uGBUnTL6QGim4prEqQkOwAKL4FLk/LTl

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\839b109a049701939875ba44b8fdeca6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\839b109a049701939875ba44b8fdeca6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\839b109a049701939875ba44b8fdeca6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\839b109a049701939875ba44b8fdeca6_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:288
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\run.bat
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Users\Admin\AppData\Local\Temp\svohcst.exe
          "C:\Users\Admin\AppData\Local\Temp\svohcst.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\svohcst.exe
            C:\Users\Admin\AppData\Local\Temp\svohcst.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\run.bat

    Filesize

    266B

    MD5

    77d50bf1776fed1485ca0a447215808e

    SHA1

    de05237da25b1f5aab4bd40a934376687f0999e6

    SHA256

    21b9b574061171cfa48442f26d5052697b64146b060f4d9bdeaab9b5c72ec62a

    SHA512

    7216a785896cd9ece48283d9d4f4dc9a631899a6f9cc2a771dd02bd8f8a69ebb9afc8f991e7205dda39a26de37b506c6a3b115eda0e5af704255c6f1c09d57e5

  • \Users\Admin\AppData\Local\Temp\svohcst.exe

    Filesize

    45KB

    MD5

    839b109a049701939875ba44b8fdeca6

    SHA1

    9098bed3de44397099201a9380b49d4379116fdf

    SHA256

    e43c26f92952a7ffd2b0579714cd79384feaa9701aeef3bd9b04bc7bc1dc7f77

    SHA512

    e1a2bcb4498be3ddd3a7457c47c0aecf6aa183c1111d25095f7c5968d5c30dcb29461e69373c7eaac3f73461213bfd6fde214c8979d5c7115e4fddb7426f5133

  • memory/288-4-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1716-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1716-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2104-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2104-1-0x0000000000220000-0x000000000023A000-memory.dmp

    Filesize

    104KB

  • memory/2104-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2720-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2720-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2756-23-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB