Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 23:26

General

  • Target

    881874a070327d9bc21841430e615142_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    881874a070327d9bc21841430e615142

  • SHA1

    4dbcc24e883792c348a75b661f52d4b2d42a2a32

  • SHA256

    505d65ac3377a85efb39c706e35101306e001788e02abdd4593fcf4bc24013fc

  • SHA512

    bc627a15228dd4f7238009bb386e96cad2d45166d9bd4e8e1af8dc4b658fb0aaa5e577e6edc622040ec86f6a7bb0861218de5d97b1b06ebe8916e3c7a9b07f18

  • SSDEEP

    384:LqViEXfy9+Zd7oL9usCGFCHe4pqyqUhnYPkWEbt5NQuBNY:eVZX3oTCGFC+4pvhnkkfvBNY

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Executes dropped EXE 5 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\881874a070327d9bc21841430e615142_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\881874a070327d9bc21841430e615142_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Event Triggered Execution: Image File Execution Options Injection
    • Impair Defenses: Safe Mode Boot
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
        PID:2756
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\\svchost.exe 10.127.0.1
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2588
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\\svchost.exe 10.127.0.2
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2884
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\\svchost.exe 10.127.0.3
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2188
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\\svchost.exe 10.127.0.4
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1500
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\\svchost.exe 10.127.0.5
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1240

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\svchost.exe

            Filesize

            5KB

            MD5

            cb9bdfde8f15d9af1353940632936d09

            SHA1

            67e27f1b550813f5ac08ad7ba53a0f1731b3bbb5

            SHA256

            debdbd31ce2269b2c61b42992fb8d90fee649e5e4c7c591da6a5d014f7290713

            SHA512

            741d50a93ee9307da18e09a822277db8a536afdce9cf15dbfbb2ff01ff5fe6540102f85e2c1ca6efd6bdcd10e48cbc63341c88710599d932201941c7b2c15c38

          • \Users\Admin\AppData\Local\Temp\urlm0n.dll

            Filesize

            1.1MB

            MD5

            2ee1e467d73642afddb03019f58c252b

            SHA1

            ea1f3b03f46db029a955190692cecbc571e1d46c

            SHA256

            5a7d5dafe22082b3ed035d640578ed7b5005edfe80e5c911774ec77a2caff1b3

            SHA512

            3482715d7c9adbfe61f7834120d1a8fce47ae5d70add285ddcfe8802a5d4a95ae00ae82079b9b9639c5d4fa5126ecfc61e1b09a141c0fea86926e26fc22f9082