Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 03:45

General

  • Target

    84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    84af2ab703050f1cec176535a9c5d12e

  • SHA1

    2a31814559d5480961dd7627df8e239672e7b68e

  • SHA256

    5c0f93efb52051a3937a738c1fd8ae68b7f3c869cc1ffefc1b4c9fcc4a66c168

  • SHA512

    90e554a426ba0a7f17708800db8eef6dcd4b1762bb620c40396303dabbf4e41799bd868691f9eb5607b49f3998ecbdb85f7f3872c41cb82453ab94428f64ea98

  • SSDEEP

    768:uSb7BvPZF1z3Bl4Hyyc8KB5Yg8yvepyq:bHtTJ3BlKg8KOAwX

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Deletes itself 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 5 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84af2ab703050f1cec176535a9c5d12e_JaffaCakes118.exe"
    1⤵
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c color.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\color.bat

    Filesize

    242B

    MD5

    02633cd5914f4bed2681cbc4d4b12b34

    SHA1

    7e63a415c7bd512d4037a55028cf672c151388d0

    SHA256

    cf79ef513f228ef0ccfb50746b150bd9c8943c9336484cd1b903ce560bbcd3ce

    SHA512

    6e534004ecaece2fc5a1891f33e06bfde4f3cac46bf67543f58abe48cba846624ac66842a2abd99dcb3654634dfd62e717ba7aa400b3bf79c27f04961181801a

  • memory/1316-1-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1316-10-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB