Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 12:03

General

  • Target

    8a49ca54557f424447f7c047c9f44530_JaffaCakes118.exe

  • Size

    450KB

  • MD5

    8a49ca54557f424447f7c047c9f44530

  • SHA1

    f1f7fc3d8a51f868a5672e306fcaf44800ca2b1a

  • SHA256

    8fe2f28d98f335d1f9af40ae021ac2b4b6010ddac51693106ae00601403fb2c2

  • SHA512

    3b75e02169a57e6ca902b3526d1f8d46d3e58e186f8e3f096132a00686f4b906d722d3451bc142c3c274a6bec419996d898bba696e905e91fdccd3978bad048a

  • SSDEEP

    12288:AT49lrHMGB77C6PFGPqnlrZHXwRvAsFN9Ez9j+r7b9uG1olY:AT49pP5XTll8vlWz9j+jIG1oY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a49ca54557f424447f7c047c9f44530_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8a49ca54557f424447f7c047c9f44530_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2960
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:1676

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Hacker.com.cn.exe

            Filesize

            450KB

            MD5

            8a49ca54557f424447f7c047c9f44530

            SHA1

            f1f7fc3d8a51f868a5672e306fcaf44800ca2b1a

            SHA256

            8fe2f28d98f335d1f9af40ae021ac2b4b6010ddac51693106ae00601403fb2c2

            SHA512

            3b75e02169a57e6ca902b3526d1f8d46d3e58e186f8e3f096132a00686f4b906d722d3451bc142c3c274a6bec419996d898bba696e905e91fdccd3978bad048a

          • C:\Windows\uninstal.bat

            Filesize

            218B

            MD5

            1495199646c86d5fc1fa0c72a602d328

            SHA1

            fa2e6499a34a8c46bfeaf94442893831451acf03

            SHA256

            4c8f3bb92df474124db4858624f2a0fda4326be11a07a8ca4561eca3453e2556

            SHA512

            3def6b3fc69b3342612f501efa58226e41c895dcbbc0e17d6383ff4cb15a550b4123e7b1a00e5ff748844fe1498b0ce53cc64d2106026fb676bd895bad971a8e

          • memory/1872-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/1872-13-0x0000000000400000-0x00000000004C9000-memory.dmp

            Filesize

            804KB

          • memory/2328-4-0x00000000004D0000-0x00000000004D1000-memory.dmp

            Filesize

            4KB

          • memory/2328-15-0x0000000000400000-0x00000000004C9000-memory.dmp

            Filesize

            804KB

          • memory/2328-17-0x00000000004D0000-0x00000000004D1000-memory.dmp

            Filesize

            4KB

          • memory/2328-20-0x0000000000400000-0x00000000004C9000-memory.dmp

            Filesize

            804KB