Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/08/2024, 21:14

General

  • Target

    94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe

  • Size

    526KB

  • MD5

    94c2ea8ace02db25b35b3ca26e8e3968

  • SHA1

    17f8f85097fd93ff54e9f10d96b0a49dd39ace89

  • SHA256

    bbd6f439e5e43a247da9983615ab4938558a2ddf23ac2fcf51de74482e296341

  • SHA512

    abcbed11548d1b9e8e5f3c5582c1342292ce650a4620080774f19b4133eb7447c44aed032b2688a3ce5ce48e4edde8ae9ec513e6781903648d4746b53ac775de

  • SSDEEP

    6144:d9jzLW39MJFSWV9x/5IMyd62jvwAVo7RBcJmDC7DGDpDmDbzy4VhRGumJUzXshtz:7Pjzd5I02jvwA+c3y4NGum+q4Ho

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 21 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\WINDOWS\SysWOW64\dlllhost.exe
      C:\WINDOWS\system32\dlllhost.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3324
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windowsrunner.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\dlllhost.exe

          Filesize

          526KB

          MD5

          94c2ea8ace02db25b35b3ca26e8e3968

          SHA1

          17f8f85097fd93ff54e9f10d96b0a49dd39ace89

          SHA256

          bbd6f439e5e43a247da9983615ab4938558a2ddf23ac2fcf51de74482e296341

          SHA512

          abcbed11548d1b9e8e5f3c5582c1342292ce650a4620080774f19b4133eb7447c44aed032b2688a3ce5ce48e4edde8ae9ec513e6781903648d4746b53ac775de

        • C:\Windows\SysWOW64\logs.txt

          Filesize

          27B

          MD5

          709191d3408d179db0aff8bbbca7e249

          SHA1

          407ef9fff2bbeb2b85738a39c8bbbaa2dcf9b2fd

          SHA256

          ed8f9de65ce3dc77975224b9d88a38dc6f211b6d9bd9ac1659260f92232fc109

          SHA512

          f7b4087507e3fcf834da069cb97db034be549af8d78874166e990a164f7f9a39baa6492906ac56c3c23d0e2a11d8a2634e1c455ac2facded7c8011244f1e1529

        • C:\Windowsrunner.bat

          Filesize

          92B

          MD5

          75adeec16e9365d94f540630ef7c10b6

          SHA1

          f1a583233d08e0988ec93b37ebedb6dc1aec1c97

          SHA256

          5585ac12a3e277c17b7f2894cfaf39f4213e858e0bc510d34574e6aac39bdeaf

          SHA512

          461160dcac41e214ff1347820195e26fca908d03b63d51e6b82b51f596114a9767cf5dda5e9140171bc57f1bb89687e5fcce211deef536241c6bb4bb2772223c

        • memory/1748-0-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1748-14-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/3324-27-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB