Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 22:59

General

  • Target

    8804492846407c848fc1f2359d77b621_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    8804492846407c848fc1f2359d77b621

  • SHA1

    a3aef07215469c4124655a99c8113ebe53c17b8c

  • SHA256

    9c8eda7f357d0528f3f58f87d655a02fb1719532b38dd63a33df4b2d43e70834

  • SHA512

    8ebd9723cbba47967a60104bf8ca026981b2402dc9a63ee7fb97f60a4d958364f16d7d0153773581cfaccd563e2741c3979568028013322a2fd6efd38a69999c

  • SSDEEP

    768:OroiqqZOQQDE432IjONcoLEnmZ5sAcY3ef3ykFf80:OrvqqZxQY4GdZ5sAbi3yex

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8804492846407c848fc1f2359d77b621_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8804492846407c848fc1f2359d77b621_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\svcsysreg.exe
      "C:\Windows\system32\svcsysreg.exe"
      2⤵
      • Executes dropped EXE
      PID:3004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\8804492846407c848fc1f2359d77b621_JaffaCakes118.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8804492846407c848fc1f2359d77b621_JaffaCakes118.bat

    Filesize

    292B

    MD5

    38eb0e7f549cb1695570f761d14c70ca

    SHA1

    486b4dfaf37189ff304d8d728f2a230552ab64c6

    SHA256

    a03100392d3d7e6605e48d85084271c25727b74fb0658e7a304b0c41f1ac24f5

    SHA512

    f56c4101bb5776acda9dc6b4b224913be5a2e7eed538aa5b81382fa2bc048daf0e88d8760751f9c05941b81c2ca975ae3c80be769b80dea5e4f26172b77b7b6c

  • \Windows\SysWOW64\svcsysreg.exe

    Filesize

    14KB

    MD5

    f3c1c3550e7e510b5aa2e3195e7dc310

    SHA1

    3cadd45ef9bd6076327d8f1de4ad45a5351667bc

    SHA256

    8321246d3aa42e463d5e80255de2fce9b0199e6258291fddbfab2ad37b347455

    SHA512

    de444bbbf6828eb960f26b146da969b79777976f579b4f2938603bb42970d1d5c7599232ee7bdb08bc842ccdb136b733ac89d1f18df0a65966c4dac152a34c27

  • memory/1768-16-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3004-17-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3004-19-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3004-20-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3004-21-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3004-25-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3004-32-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB