Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 19:50

General

  • Target

    8bba0456bb93b66f2d4a744369d81fc6_JaffaCakes118.exe

  • Size

    635KB

  • MD5

    8bba0456bb93b66f2d4a744369d81fc6

  • SHA1

    99e1c9bc408ace92281ee0c76d01d717aa123fc9

  • SHA256

    83480fca34ddd3ed41e47f3e9df56af9335ee7e1ac2fa294f462eefaefab2e7c

  • SHA512

    503260e4add00fb5248c8a1517013c418f8dfc5da2ec9e1911de9fabd5624edd88caae745cd615543479e5d89d10b2ab43df97180c89b968509819316a56ce79

  • SSDEEP

    12288:SDwcSW0JXwcb8IDZtQAGYMPRZqF3Z4mxxpDqVTVOCe:+wXWQTb8IDZtQAGYMOQmXAVTze

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bba0456bb93b66f2d4a744369d81fc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bba0456bb93b66f2d4a744369d81fc6_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2444
  • C:\Windows\Hacker
    C:\Windows\Hacker
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Hacker

    Filesize

    635KB

    MD5

    8bba0456bb93b66f2d4a744369d81fc6

    SHA1

    99e1c9bc408ace92281ee0c76d01d717aa123fc9

    SHA256

    83480fca34ddd3ed41e47f3e9df56af9335ee7e1ac2fa294f462eefaefab2e7c

    SHA512

    503260e4add00fb5248c8a1517013c418f8dfc5da2ec9e1911de9fabd5624edd88caae745cd615543479e5d89d10b2ab43df97180c89b968509819316a56ce79

  • C:\Windows\uninstal.bat

    Filesize

    218B

    MD5

    73359095e96bf9c7e804971380a119d5

    SHA1

    f868c51fb7412373c20f52a3d96657150385b433

    SHA256

    e2cc17428d5abe8db07f5e176708d08d4f83fa466e1d8f31ba1f146d02811c26

    SHA512

    6aff500736468d1e159de6300eb8821aedf41a0f24963d10a03afc83fdd793d3e61e9f51554cd9605cf75b3bd87509dab68283928e249c12cc3d7535842ef0aa

  • memory/1760-12-0x0000000003280000-0x0000000003284000-memory.dmp

    Filesize

    16KB

  • memory/1760-6-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/1760-0-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-32-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-21-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB

  • memory/1760-18-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/1760-17-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/1760-16-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/1760-15-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1760-14-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1760-11-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/1760-13-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/1760-10-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB

  • memory/1760-34-0x00000000005F0000-0x0000000000644000-memory.dmp

    Filesize

    336KB

  • memory/1760-1-0x00000000005F0000-0x0000000000644000-memory.dmp

    Filesize

    336KB

  • memory/1760-4-0x0000000001EF0000-0x0000000001EF1000-memory.dmp

    Filesize

    4KB

  • memory/1760-3-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/1760-2-0x0000000001EC0000-0x0000000001EC1000-memory.dmp

    Filesize

    4KB

  • memory/1760-5-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/1760-9-0x0000000001F00000-0x0000000001F01000-memory.dmp

    Filesize

    4KB

  • memory/1760-8-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

    Filesize

    4KB

  • memory/1760-7-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

    Filesize

    4KB

  • memory/2428-24-0x0000000000340000-0x0000000000394000-memory.dmp

    Filesize

    336KB

  • memory/2428-23-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2428-35-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2428-36-0x0000000000340000-0x0000000000394000-memory.dmp

    Filesize

    336KB