Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 16:34

General

  • Target

    8b1d3ab3f2cfdb75e17ec87087c05727_JaffaCakes118.exe

  • Size

    5.8MB

  • MD5

    8b1d3ab3f2cfdb75e17ec87087c05727

  • SHA1

    e46f3c05c46589ac6e211100f81f5da85008be61

  • SHA256

    c0e02068b550e49d0bfd2210a65a532057de7e5908b80ec7e3be3a9831fcfb30

  • SHA512

    a093a6368bc8f58c3aad5779edbd21a6498065b219bab9740b2a2c2ef01de93a778b5cf25db29d7698ac4278ad87af6eab9ae7b5538ea0ee8b9acfadac8ab398

  • SSDEEP

    98304:r5+sES24q0M4P+bARAPlN3mhHAh4XA1jdtn9NuK9+QBG4Y:r5tq0JmdN2qhH1jb9b+oN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b1d3ab3f2cfdb75e17ec87087c05727_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b1d3ab3f2cfdb75e17ec87087c05727_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\windows\sysbp\Cts2.94.exe
      C:\windows\sysbp\Cts2.94.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\windows\sysbp\Cts2.94.exe

          Filesize

          5.6MB

          MD5

          01fad422a7838b855ad1b61bdd437dd4

          SHA1

          f249c7210f7cd77accfa45f3ea0a1831794b1798

          SHA256

          01c01caa5c327802a6cfaed7b6fd0540c67e59d410b7b6d68df87c226d7db75b

          SHA512

          3931687986cdaf4abedecd9a5c9149760a575dd658fe8166edeb331743939bdc44d78b2deefc9c940ad692ab7d016067c5ab640e5d314221b002212694ac2a4d

        • memory/824-12-0x0000000003E40000-0x00000000049AA000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-21-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-22-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-14-0x0000000000270000-0x00000000002A9000-memory.dmp

          Filesize

          228KB

        • memory/2764-17-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2764-19-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-20-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-18-0x0000000000270000-0x00000000002A9000-memory.dmp

          Filesize

          228KB

        • memory/2764-16-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-25-0x0000000000401000-0x00000000004FE000-memory.dmp

          Filesize

          1012KB

        • memory/2764-24-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-26-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-28-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB

        • memory/2764-30-0x0000000000270000-0x00000000002A9000-memory.dmp

          Filesize

          228KB

        • memory/2764-31-0x0000000000400000-0x0000000000F6A000-memory.dmp

          Filesize

          11.4MB