Analysis

  • max time kernel
    142s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 13:25

General

  • Target

    8ee530ae84c0bc2fe5a837a20a4b1133_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    8ee530ae84c0bc2fe5a837a20a4b1133

  • SHA1

    662d90e810a15d3fad76df8fa83e2be816672340

  • SHA256

    da588288d74c949095b79024ade6a4c5d0231a5ac707a921af80d85e31c682cd

  • SHA512

    c1798b80ba525dbd23ea414710b6b97d1056c4b5aa297549a492b6e9382794e1fe5ca961238eb0ad071e111e184adc7927c2af7a237fc46f5b3ba0096c32b238

  • SSDEEP

    384:pLFtmOHAfkE8Mfi+ID1xLOVj/Y9MB3RO+DzNDz3:zAfkEaBRxLOV89MhRnHN

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\8ee530ae84c0bc2fe5a837a20a4b1133_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\8ee530ae84c0bc2fe5a837a20a4b1133_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\wgso0.dll

      Filesize

      14KB

      MD5

      0ef78dea9a4b1d916c2aa3eec3233534

      SHA1

      55737cafe1831ee4966ce6dec37ebb58295de7a6

      SHA256

      53a3cc5ae268c4c44f403325ca7032358ebdb72a683de68d8b58897b5e5ee205

      SHA512

      5e5bad46ede98c06e3bc53220c04e6964fff65ff8daa23741b6a8fb2cac52bcaa59b600645939606b230dd50a9bb9664a2b205face4a1094a067a94a0bb602de

    • memory/1220-3-0x0000000002640000-0x0000000002641000-memory.dmp

      Filesize

      4KB

    • memory/2928-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2928-6-0x0000000010000000-0x0000000010009000-memory.dmp

      Filesize

      36KB

    • memory/2928-7-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB