Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 21:18

General

  • Target

    8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe

  • Size

    57KB

  • MD5

    8c01880e00449f251c9c0c8aeded1910

  • SHA1

    af1f0688f6aa84fbf3561bde0a0f93bb13f850a7

  • SHA256

    bcfa60ea21b3f1d94c630aaa6de94e6b01b995cf9886fd7adb30cce110e4bb9e

  • SHA512

    ed1789906a38855877e1ba33cd6303486d94d22c22e4863416b55e2b7970062a87839d4572fd80611e0ac2de7b5dd299a9f6e84ce9cecb092689798560313fa5

  • SSDEEP

    768:x3lrPxlT3w0XtqmI086s16Rr2Y/i6J0AS1ndnUg/kpOnpkRHyPO/tNce8SpA7:7PT3wcxlq6Rr28TxuVUzpekkGce8Sg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c01880e00449f251c9c0c8aeded1910_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\sfx9E81.tmp
      -F:C:\Users\Admin\AppData\Local\Temp\sd9E82.tmp
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sd9E82.tmp

    Filesize

    33KB

    MD5

    4b2dfb76b5eebdc3702dcacef08fc0aa

    SHA1

    4ba7bebf533c2aa80dfdb399d3a725e6b095ef15

    SHA256

    1233624787a9be3bb9127adadd21fc649d6fe87ad33b55dd44ee807a24ffb9a4

    SHA512

    11dfc1ee0f163e05dffe14fb12541807a72e1d8a975fb7be94c4091a43fff4f55ad066aaf7e075eb0dcc594d4255d1f5a4100ba3a7924e82bda48357a39d9c39

  • C:\Users\Admin\AppData\Local\Temp\sfx9E81.tmp

    Filesize

    92KB

    MD5

    fab0d4e38d26958e0d5db94706bc8d02

    SHA1

    d4f0dd9c451ddc01dbc06085d5465b7971c07886

    SHA256

    b83b0b7a8e4ec464142c25b8846ade14d24c48cb1fb4f93415723d64f98fc45c

    SHA512

    e93574aa92be5e4b7eb605292fa83b06c26f5c6d05b5f3f4a685cc74c81c2c1140957400eae4d9f7f3558c12d87315d8414441bf9e32a91d5a6aff9bef803060