Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 06:07

General

  • Target

    8949532a3675ce0da1df9e97a796d142_JaffaCakes118.exe

  • Size

    110KB

  • MD5

    8949532a3675ce0da1df9e97a796d142

  • SHA1

    d77644b2f21ecd71eef297da2ddfcb7b90000975

  • SHA256

    ea4a967967abd9e80c0d90b656df1bcf2bd69d09c5cc75e9534222330c996c4e

  • SHA512

    dcf73bdaa68af1011c61a45e07fbf9ca12e595824387f58d22444a2c2da4cecf88ad1f76af6db437dfa6496436754cf6377a6725c1f6e9f4f28193cae8a2ef1d

  • SSDEEP

    3072:RmMJrBwzBaCzZ/T7VnRhhoYHHvapVWeO2W:R14BaC9BJdHvapVvOd

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8949532a3675ce0da1df9e97a796d142_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8949532a3675ce0da1df9e97a796d142_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\WINDOWS\SysWOW64\Exploer.exe
      C:\WINDOWS\system32\Exploer.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\logs.txt

    Filesize

    30B

    MD5

    e397904513eff9a7f81c420673c9bbda

    SHA1

    30fe5a2086f1e45b3e650608942608aac3563553

    SHA256

    163f554360f8eba347300de57721e5840c61210fd1f31e76ae1e4b89066b828d

    SHA512

    120b049f48c5e88cfb4a5d4c3b19299a004c577958982d40fc8a4bb64b40be5207038a76a84c41f041fbd3355a696697758df1696dbd3c2e1401f80682c0a1bb

  • \Windows\SysWOW64\Exploer.exe

    Filesize

    110KB

    MD5

    8949532a3675ce0da1df9e97a796d142

    SHA1

    d77644b2f21ecd71eef297da2ddfcb7b90000975

    SHA256

    ea4a967967abd9e80c0d90b656df1bcf2bd69d09c5cc75e9534222330c996c4e

    SHA512

    dcf73bdaa68af1011c61a45e07fbf9ca12e595824387f58d22444a2c2da4cecf88ad1f76af6db437dfa6496436754cf6377a6725c1f6e9f4f28193cae8a2ef1d

  • memory/2440-24-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2440-36-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2440-48-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2440-59-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2440-72-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2440-90-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2440-101-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2736-0-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2736-8-0x0000000003670000-0x00000000036DD000-memory.dmp

    Filesize

    436KB

  • memory/2736-18-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB