Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 13:27

General

  • Target

    863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe

  • Size

    414KB

  • MD5

    863b5d2c84f4ee7889191be12039c321

  • SHA1

    20315e8c53e1ffcb950c74a671f5f3b35348f490

  • SHA256

    e1f89fdd0193c44ecb6562424851fe9abad4178f40d9dd3964dbcb69f0a2e7ff

  • SHA512

    4fb17aa932d48c5ca5b67baaff6e1bef53ca46263aee930a003eeaa89e49307eecf158820bba59de01406dc151cd6d4a832b50f4ed774416462ebe9f8a15c779

  • SSDEEP

    3072:EmVW8iTX/3RflkXq1+0cxxsWEL02fXcIp08Moe9DESvC:VM7jJlLxYTHYZM1A

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:2572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\msncracker.exe

          Filesize

          81KB

          MD5

          62183c3e4ef63000d58f8aed24287fcf

          SHA1

          905cafc17413dbf252a6f61ea801eb0b431af515

          SHA256

          f2052dffaf20dfc958d54812716fe7fa89056ea0f40063898754f4217de9b511

          SHA512

          34771071bb0d5280f15430d5fa8936b6687a6ba885145c72f03b93ec51e1d3a65a828863f2a50425b60f1dd63fd517be2c44beefb515be7b892a942add272ac6

        • memory/2572-3-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2572-34-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB