Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 19:15

General

  • Target

    94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe

  • Size

    35KB

  • MD5

    94619c824c2079a51e4c1f1003121493

  • SHA1

    0482b80d52ad2768eef5e25eef38b5736480e3f9

  • SHA256

    840314d4b2d64e0682c572d8724e95af3444dec1e8c8c553ec7b8836a3be02e6

  • SHA512

    39d1b5e7344affde52f5fc1f687e79bf22e44cf466d0fefdcbd5337bddec097e7fd2acf80d70c46df12c7a8feccb1a46567425ba1c77cdba4e16300f59b13723

  • SSDEEP

    384:x9RlQG13BLgexxxaR0O834rfmAT/5bcicoAVmaqsj7T0oY7cQ67oJk1Ziwf6hycM:TQGpmes+olciha/sw8cF6srxLwN97jO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 5 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
        "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
          "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
            "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

    Filesize

    35KB

    MD5

    6d1a8c4940224a70d938810f9c0e7880

    SHA1

    d0e9f67c010ef7cfa1add33ae2815520637fe4dd

    SHA256

    46e8f36cc0da05cbd6245594de5d211da7e699cbc21a2f2a35207e5e6bcccb45

    SHA512

    62dccb362c4d6c83d63d07eb2ceb95464b12624bbda920d95bdc20b4b73db5944a373a11c78d828ca9c53f0c4632ddcec7ffe18c98dea246c039c0e444b93444

  • memory/2352-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-6-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-5-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-2-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-12-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2352-39-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2404-41-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB