Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 18:36

General

  • Target

    8b83f87a013d3674008eeb3f36520eef_JaffaCakes118.exe

  • Size

    180KB

  • MD5

    8b83f87a013d3674008eeb3f36520eef

  • SHA1

    360f3e8c87523e13766828b0fa43d01f3eb11a70

  • SHA256

    ccf42782bf4dbc5e467cd582c986be1f2e36b1b4c66c882eab4efc6fdbe24384

  • SHA512

    a0f72c58d3fd3289cfdd666d708b5903f663010e4946ecbc05227487fc78625cc2e6c55ed2ba240c73f8340b2e9d17f0090a8cf0e22ac889637c4ca871d7194a

  • SSDEEP

    3072:JW9ys0FU/RiJwRkOndQ03yNWRySUhSPNO7CXfQRVlIjHHmuTS5Xc+ow0BvY:o9KWRiJE3PgJk4eXfIQJ+XxoXW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b83f87a013d3674008eeb3f36520eef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b83f87a013d3674008eeb3f36520eef_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\f1ea79589d93afe8c6cafcbcffbe45f5.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f1ea79589d93afe8c6cafcbcffbe45f5.bat

    Filesize

    219B

    MD5

    4506e2367e48b410a8dd9f13c1f533b8

    SHA1

    291cb1c17e38af1b7f3244a5062c1efea651ace5

    SHA256

    cecff654b7b8d5fcdf1740f2ec0a8eff57a9226646d2c93107a0cc0c99f560e9

    SHA512

    650487f6b99e28896f56735b7ebc290136bfcf2b44c4ced81b83eeb05cb91228c29a9bebb329fe24637f1599c1b4140f5e00bf5b5528116677702d520c253e16

  • memory/2704-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2704-16-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB