Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 21:51

General

  • Target

    8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    8c1c151afa61de888de5954a5d6c0a06

  • SHA1

    e4402911da92d8f5288066a3e4b1b1cb50efb180

  • SHA256

    592860e784ff96d9530ebd3ae455f5605bb6b819d5636cca43ccd9a1cf02eeaf

  • SHA512

    d1e4b6545040f72d11413f359f15108978268718c80ff4b500fac7e91517000e7afe2d4fa90d984d18866eb11e3c21406dac48ccb6c19e694477312e4d102ba8

  • SSDEEP

    3072:mZ7LJdATD5BqMdcj/7kdQMgLPYUgw3xpAXJEz33YNx:mZ7dd2VBqXnkK3LAUgw3MuYH

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c1c151afa61de888de5954a5d6c0a06_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2104
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Iypt\Vuwplkago.pic

    Filesize

    1.9MB

    MD5

    ed3a784603cc863fe9781b5139a8c27a

    SHA1

    c0253c698268c8a0283ce2affdad4f985c69cfc1

    SHA256

    3115c3ae90ea55d6867dd05d2ba1c49bf68d89e5b5e9e02def76ae0335344700

    SHA512

    451db926af288b490fd212a5b13b0ef42dffe3e544d118b25ffb4ef953a5bebd4e52b4198355cf21205586bea936387e9b87d152a51d48e8acf54492774575de

  • \??\c:\NT_Path.old

    Filesize

    124B

    MD5

    76101bb4f713e5824a4abd01492fd4da

    SHA1

    662fc5af862a049951614af4afd719910f7309f9

    SHA256

    f2d32fae8eb118ff95094312813dff4c84665190dcd4aed51e734113d4f77b62

    SHA512

    e8326443af29a525bc038a41a1905032594d4431d439a1f9633181dfeb165fe79c74c0f2ff6dd10bcd1401afce3f0c00cca456ac42b780b968a8736532841f0b

  • \Windows\SysWOW64\fucktray2420000.dll

    Filesize

    112KB

    MD5

    79dd66ade2b79e99e4413911da706ba7

    SHA1

    9a9305a84358ff4e08364e1698817b6b8cdf7862

    SHA256

    cef0b92ecd5de2b7898796b68c15fcd15116591e480b74129f6161f5e3016d21

    SHA512

    06d18adae70fae76b13adf2b7cb791cedd3f5e57caf7d9d0dedff81b1ec847cc0f9857354f5bc8da175be97d79c787036532c72842f1c08aca91e44d9419cbe7