Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 01:41

General

  • Target

    8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe

  • Size

    297KB

  • MD5

    8458a42f33ade9316bd386d569dac3ec

  • SHA1

    7c441a42d73870c79547dab628b8263654042ea4

  • SHA256

    ea84736f790d4d0968b3d0bf4cc70c63875bd130b6ed6375ee61f3f130b967ab

  • SHA512

    09b6d74be06c1cab8fc39321b57c3a1ace912047853de039d7927615d27e3d77de1312ff0846ad53c88d336d3ceba34b0e4765c9d99c14bfb26a06a7b7b61925

  • SSDEEP

    3072:Hpe7/PX0omWqLEnCYvcvIXRTy1hmUI0xlOcwXIvS3oGcFuG9hFoHk148GzMwZpf/:JiX5vDx8hzNxl8XIvSiFxTO8GzMi

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1236
          • C:\Users\Admin\AppData\Local\Temp\8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\8458a42f33ade9316bd386d569dac3ec_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Users\Admin\AppData\Roaming\Tolu\ceedo.exe
              "C:\Users\Admin\AppData\Roaming\Tolu\ceedo.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2616
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8918c1c3.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2028
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1212

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp8918c1c3.bat

            Filesize

            271B

            MD5

            79337e5079e0e706c49c3b986459b76a

            SHA1

            e0b86531c33d80bbfae1fbc0a1cea4b7b39d569d

            SHA256

            273c6dbb9f494f67a5108561b771ac888e1008cefe4bc9be64bec3a4fffc7582

            SHA512

            5107ace1efdb912b5d573767d6a0e69a0bbb29ed943f2632acb71ce5f480433c9ea1032ab91ca2c73c1fb3e19ac62c82ce134425da7b1dcfe925b7b62a8db199

          • \Users\Admin\AppData\Roaming\Tolu\ceedo.exe

            Filesize

            297KB

            MD5

            a9a8fada3d477481d314f93a2d682677

            SHA1

            cba833d1aeeb83d2d1a826f4588a14844b01f8fe

            SHA256

            f096ffe633551e78eca69c17c1a837ee96978cdd830d2670cbaec0a89550f05f

            SHA512

            a49d742764b8accd2f684fc36229353b51e95c9ac3dd7cc0c70ff248943d28dae3e4540013c098cda3f384d50094681854d85e46a53343ce9cc67492744ad2ea

          • memory/1120-18-0x0000000002020000-0x0000000002064000-memory.dmp

            Filesize

            272KB

          • memory/1120-16-0x0000000002020000-0x0000000002064000-memory.dmp

            Filesize

            272KB

          • memory/1120-17-0x0000000002020000-0x0000000002064000-memory.dmp

            Filesize

            272KB

          • memory/1120-15-0x0000000002020000-0x0000000002064000-memory.dmp

            Filesize

            272KB

          • memory/1120-19-0x0000000002020000-0x0000000002064000-memory.dmp

            Filesize

            272KB

          • memory/1176-24-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1176-22-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1176-21-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1176-23-0x00000000020A0000-0x00000000020E4000-memory.dmp

            Filesize

            272KB

          • memory/1212-32-0x0000000001F20000-0x0000000001F64000-memory.dmp

            Filesize

            272KB

          • memory/1212-31-0x0000000001F20000-0x0000000001F64000-memory.dmp

            Filesize

            272KB

          • memory/1212-33-0x0000000001F20000-0x0000000001F64000-memory.dmp

            Filesize

            272KB

          • memory/1212-34-0x0000000001F20000-0x0000000001F64000-memory.dmp

            Filesize

            272KB

          • memory/1236-27-0x0000000002D90000-0x0000000002DD4000-memory.dmp

            Filesize

            272KB

          • memory/1236-26-0x0000000002D90000-0x0000000002DD4000-memory.dmp

            Filesize

            272KB

          • memory/1236-29-0x0000000002D90000-0x0000000002DD4000-memory.dmp

            Filesize

            272KB

          • memory/1236-28-0x0000000002D90000-0x0000000002DD4000-memory.dmp

            Filesize

            272KB

          • memory/2616-277-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/2616-278-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2616-275-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/2616-12-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/2616-13-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2932-75-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-65-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-57-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-55-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-53-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-51-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-49-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-47-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-45-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-43-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-41-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-39-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-38-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-37-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-36-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-61-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-63-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-59-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-67-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-69-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-71-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-73-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-152-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2932-153-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-1-0x0000000000320000-0x000000000036D000-memory.dmp

            Filesize

            308KB

          • memory/2932-127-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-129-0x0000000000830000-0x0000000000831000-memory.dmp

            Filesize

            4KB

          • memory/2932-128-0x0000000077A00000-0x0000000077A01000-memory.dmp

            Filesize

            4KB

          • memory/2932-40-0x0000000001E70000-0x0000000001EB4000-memory.dmp

            Filesize

            272KB

          • memory/2932-4-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2932-7-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2932-0-0x00000000002D0000-0x0000000000314000-memory.dmp

            Filesize

            272KB

          • memory/2932-3-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2932-2-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB