Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 13:42

General

  • Target

    9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe

  • Size

    706KB

  • MD5

    9653809fac7b3b612f49d26a99e4bf5a

  • SHA1

    b848e0ac13dbf2ea1b60b776b47b9260453694e1

  • SHA256

    18820505ca0f5ac2407562ec620592b5da23aa0f7cfe7347dcc8589aa45e8d9d

  • SHA512

    50c563d46efa5c2ae91e651fe93176c92d8c9fbc70019654f5c5ec771a7756ec5af79bc1188cd845739796732a243191ffff047584d268c33dc2c2559ad52c91

  • SSDEEP

    12288:kRycOktU4g/n/t0EW5A0z/FvJwQ5oalK+GDx9Evg7Ik6OQQ52LwRg08y5wj1xTw:IxJU4gf2EW5A25Jr1kxx9EvgIk6k32J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 692
      2⤵
      • Program crash
      PID:4968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 696
      2⤵
      • Program crash
      PID:2164
  • C:\Windows\web\www.souhu.com
    C:\Windows\web\www.souhu.com
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\WINDOWS\SysWOW64\svchost.exe
      C:\WINDOWS\system32\svchost.exe
      2⤵
        PID:2524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 12
          3⤵
          • Program crash
          PID:1532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2524 -ip 2524
      1⤵
        PID:1212
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4832 -ip 4832
        1⤵
          PID:5072
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4832 -ip 4832
          1⤵
            PID:396

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Web\www.souhu.com

            Filesize

            706KB

            MD5

            9653809fac7b3b612f49d26a99e4bf5a

            SHA1

            b848e0ac13dbf2ea1b60b776b47b9260453694e1

            SHA256

            18820505ca0f5ac2407562ec620592b5da23aa0f7cfe7347dcc8589aa45e8d9d

            SHA512

            50c563d46efa5c2ae91e651fe93176c92d8c9fbc70019654f5c5ec771a7756ec5af79bc1188cd845739796732a243191ffff047584d268c33dc2c2559ad52c91

          • memory/2136-6-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

            Filesize

            4KB

          • memory/2136-8-0x0000000000400000-0x00000000004C1F6C-memory.dmp

            Filesize

            775KB

          • memory/2524-5-0x0000000000400000-0x00000000004C2000-memory.dmp

            Filesize

            776KB

          • memory/4832-0-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB

          • memory/4832-7-0x0000000000400000-0x00000000004C1F6C-memory.dmp

            Filesize

            775KB