Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 08:11

General

  • Target

    95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe

  • Size

    646KB

  • MD5

    95472eb880fe3ff07c11da64cca4fbdd

  • SHA1

    231a4cb1944998766034aec22e8ff59b0785cffd

  • SHA256

    6843d4b9450198bd0dade53bdc1c582f31ea4356eb4c2b6d3b3bf83945620165

  • SHA512

    1854a7fdb4eae9c24808b6f20970f9f167ef995bda9fb93a3d3c8f2f31dbb874713959b6c8de03c9907734295d7fbf6ee8571fa0789dc26a866ce53b85fcd15e

  • SSDEEP

    12288:7HvZp31Yx9NCBIKxzlrKxSnOam3/Ypy1c2obY7BI3KLwd0JW:7hp29KxztORdocLwdZ

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1044
  • C:\Program Files (x86)\HgzServer\G_Server2.03.exe
    "C:\Program Files (x86)\HgzServer\G_Server2.03.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe

      Filesize

      797KB

      MD5

      2748d6c0dc61ce20af1f78645127d3a6

      SHA1

      5dae8d3cb7011fea45c974f39863dc7906b07134

      SHA256

      a774893e087c4580e58f373b585b65a4df1c71e5c85cf85578fc454010d302a8

      SHA512

      08f8bccf9f467a4bae6321f51926b114d7f51afc53609c4d30e6ec93fb65f2d544a4f277615c9500bf30d68c1022c39cde6c2b46b21f076d53b1636bdaba126f

    • C:\Windows\DELME.BAT

      Filesize

      150B

      MD5

      67e4ea2c3e65d3236c8266b9c116f67f

      SHA1

      7e87f925ccd68b2b7c9af9f92e118db1990234f9

      SHA256

      2dff6c390d03870cec06d16fe0191475fb87ad2330b78d03c15e7ff0bed8f00c

      SHA512

      1a3cf0443e932b9b57f32531b3d61c917b9eec19a4ba73336011041e16a0022c5e62b2c768b34a0bdc08ffd75bbaa0338719577001496c9de8a5638420b0a229

    • memory/1256-59-0x0000000000400000-0x00000000004D0200-memory.dmp

      Filesize

      832KB

    • memory/1256-63-0x0000000000400000-0x00000000004D0200-memory.dmp

      Filesize

      832KB

    • memory/1256-60-0x0000000000400000-0x00000000004D0200-memory.dmp

      Filesize

      832KB

    • memory/4580-48-0x0000000000400000-0x00000000004D0200-memory.dmp

      Filesize

      832KB

    • memory/4580-55-0x0000000000400000-0x00000000004D0200-memory.dmp

      Filesize

      832KB

    • memory/5044-25-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-21-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-42-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-41-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-40-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-39-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-38-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-37-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-36-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-35-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-34-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-33-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-32-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-31-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-30-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-29-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-28-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-27-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-26-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-3-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

      Filesize

      4KB

    • memory/5044-24-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-23-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-22-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-16-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-20-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-19-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-18-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-17-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-15-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-14-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-13-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-12-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-11-0x00000000029B0000-0x00000000029B1000-memory.dmp

      Filesize

      4KB

    • memory/5044-10-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/5044-9-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

      Filesize

      4KB

    • memory/5044-8-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/5044-7-0x0000000000C70000-0x0000000000C71000-memory.dmp

      Filesize

      4KB

    • memory/5044-6-0x0000000000C30000-0x0000000000C31000-memory.dmp

      Filesize

      4KB

    • memory/5044-5-0x0000000000C20000-0x0000000000C21000-memory.dmp

      Filesize

      4KB

    • memory/5044-4-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

      Filesize

      4KB

    • memory/5044-2-0x0000000000C60000-0x0000000000C61000-memory.dmp

      Filesize

      4KB

    • memory/5044-1-0x0000000000570000-0x00000000005C0000-memory.dmp

      Filesize

      320KB

    • memory/5044-0-0x0000000001000000-0x0000000001109000-memory.dmp

      Filesize

      1.0MB

    • memory/5044-56-0x0000000001000000-0x0000000001109000-memory.dmp

      Filesize

      1.0MB

    • memory/5044-57-0x0000000000570000-0x00000000005C0000-memory.dmp

      Filesize

      320KB