Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 01:52

General

  • Target

    84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe

  • Size

    267KB

  • MD5

    84601698ea183273d0c0a0153a3f3039

  • SHA1

    60df8c5f24cfa14b41aebb4038a2d22e8181b5f5

  • SHA256

    4e4a22ba8bcdfe1119c1250aa734860c3f2b55ef768bb9737ed9852df42dc8a5

  • SHA512

    c830b573a57d96bc72b89ef3e96a921862fb9a6b9aae62e69ea7ecc51ed84e0071c5ce680d74496d7a8ac0926bbb7f67a389a72a75d38077a1f9350546fbabd0

  • SSDEEP

    6144:KxZaXTfCraCZREa9PzhNOdyfxSKHKvG4Qsq/HI:KVhEghBfxSKHKemq/HI

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe
        "C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4500
        • C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe
          "C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4268
          • C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe
            "C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe" /i:4268
            5⤵
              PID:4996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe

      Filesize

      267KB

      MD5

      84601698ea183273d0c0a0153a3f3039

      SHA1

      60df8c5f24cfa14b41aebb4038a2d22e8181b5f5

      SHA256

      4e4a22ba8bcdfe1119c1250aa734860c3f2b55ef768bb9737ed9852df42dc8a5

      SHA512

      c830b573a57d96bc72b89ef3e96a921862fb9a6b9aae62e69ea7ecc51ed84e0071c5ce680d74496d7a8ac0926bbb7f67a389a72a75d38077a1f9350546fbabd0

    • memory/3600-0-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3600-1-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3600-3-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3600-4-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3600-17-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4268-24-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4268-35-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4500-25-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/4736-2-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/4996-36-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4996-38-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB