Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 14:15

General

  • Target

    966df379e65737b5bda6fc736c20f556_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    966df379e65737b5bda6fc736c20f556

  • SHA1

    b7d9ca93076d8ebedcf5692e56165a83545c58be

  • SHA256

    a795703f957c5c917d574a8771438268f3b8f971717cd347a8aa89f8c64acf3e

  • SHA512

    7673cab4256ef753004965a3f5eed1261082ff6c5f4543dffd6ab4dc9d13a087f32682d258874b46aed61f841a34c9e297feb59dcc8af86f424506550e1c81e4

  • SSDEEP

    384:ZaSIXbJ94a3bgIjqyOpzVElcjX6ufqcSC0atxo:ZaSIrJ+T63OpzVpr70atx

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\966df379e65737b5bda6fc736c20f556_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\966df379e65737b5bda6fc736c20f556_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\SysWOW64\kodensk.exe
      C:\Windows\system32\kodensk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\966df379e65737b5bda6fc736c20f556_JaffaCakes118.exe.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\966df379e65737b5bda6fc736c20f556_JaffaCakes118.exe.bat

    Filesize

    210B

    MD5

    19a19708529a9ea208b96c790abde8e3

    SHA1

    2dea1a7c3a5ee899eb1950e3172fe28a62005256

    SHA256

    3e4d668beb9f6bdea77126c36639981ad38e9818850e426a402730447505c8ff

    SHA512

    bd3234f56b3370b39f3da9b01e3180bcbb18db3e34b8d37c8d15c999d227e8bf05b369cfefb5879fd2fc9e23f19af2522a15c10ee6aace73adbd82e7e16a8e98

  • \Windows\SysWOW64\kodensk.exe

    Filesize

    14KB

    MD5

    966df379e65737b5bda6fc736c20f556

    SHA1

    b7d9ca93076d8ebedcf5692e56165a83545c58be

    SHA256

    a795703f957c5c917d574a8771438268f3b8f971717cd347a8aa89f8c64acf3e

    SHA512

    7673cab4256ef753004965a3f5eed1261082ff6c5f4543dffd6ab4dc9d13a087f32682d258874b46aed61f841a34c9e297feb59dcc8af86f424506550e1c81e4

  • memory/2016-12-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2016-14-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2312-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2312-11-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2312-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2312-13-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2312-17-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2312-18-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB