Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 03:18

General

  • Target

    8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe

  • Size

    163KB

  • MD5

    8d19f3dd50776ce064e2a665287682f6

  • SHA1

    599fe3a97d9c3290a6d4f202fd251f605f5c1127

  • SHA256

    7157e1469a315f2cfc8c38ee03a5c4d025428fba40a5cecc4859a9c3616265f8

  • SHA512

    3497b1bd37ee46ad13a22e0fbf3a5737ffbd5ba94457a50c24bbd33728275001f7e2df3829b60af34b886ab70fc55fb697b60ce9fad74a261739cfa2c8b08164

  • SSDEEP

    3072:3y+kOL/10H3UnADB/h/OwHdGBjIWVCbGHTYJWfl1iX3cO4e/P86rWiIaLHp066gV:3f+HHewAMWV1HTtrIcg

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d19f3dd50776ce064e2a665287682f6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\pacificpokersetup.exe
      C:\Users\Admin\AppData\Local\Temp\pacificpokersetup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2132

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\text.txt

          Filesize

          4KB

          MD5

          ef7b8fc0d77085b0ad9fb5aad5736d35

          SHA1

          7b5abc77d730544c82f469c5e181f220a21c7574

          SHA256

          ef929da4856b72f9d56c3af9cc0c7164beff0016446b139f64746bf8bd9e9aed

          SHA512

          fadb575e6abf1699dd0358d4fe0524d4c50008d168d90fb15aa7a93698e5410142bf899202c4aa32d962cac786b666126eec3ebdff21ec029015b9bf3c52ebb2

        • \Users\Admin\AppData\Local\Temp\GLCDCD8.tmp

          Filesize

          161KB

          MD5

          8c97d8bb1470c6498e47b12c5a03ce39

          SHA1

          15d233b22f1c3d756dca29bcc0021e6fb0b8cdf7

          SHA256

          a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a

          SHA512

          7ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f

        • \Users\Admin\AppData\Local\Temp\GLKDEDC.tmp

          Filesize

          30KB

          MD5

          3df61e5730883b2d338addd7acbe4bc4

          SHA1

          03166e6230231e7e3583cf9c8944f4967aa1bf1b

          SHA256

          2efe9a54c8eb878711d9b6cd18f276838645aff52fe69d8a864376cb258ec616

          SHA512

          36e9d705d22dad3d952b4da578a990f2b63ec2f9fbf2734efdaea9ecbd4f07a8d7232792eb5bdd81c553354d51334993cb6103c377f3483a680eac9e41cd2087

        • \Users\Admin\AppData\Local\Temp\pacificpokersetup.exe

          Filesize

          3.3MB

          MD5

          721c8b55439683e3434fbb72086c1661

          SHA1

          5122a32bcb894eb7b3a7f9c5f42d9e295643c55a

          SHA256

          25055b2d675fc6ce6d230762a019dd4b3659fbb6cc6d8f1bec67e5d92e3da239

          SHA512

          d0cc00c3f5fcc2b76d231c4712550f053b03ee4a979a5ece4d183b2d58044c63effcbab75afa80aab940f720a3d5fe9ca8c93fb1b1118801bb7f5b7242868d1d