Analysis

  • max time kernel
    150s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 17:33

General

  • Target

    970238efcd912d26261bbbf976638d98_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    970238efcd912d26261bbbf976638d98

  • SHA1

    5f4b470e46f656e698dcc6c8b96683aa817b29cc

  • SHA256

    a13b5b7fd3eaaef62ce470217b12d56da50c5c56cb36c93f75a089e3e0fd85dd

  • SHA512

    0be997aea5eea4dc9af843d7520941d13ac8bfa4d8a0a58f3c3169ff66a381238f1d21d32accedd31010ae87c25782ea380713fa533d3d6cd5bf69b77136427a

  • SSDEEP

    6144:2Cf96BO50qlZYP+AC9SJfZzNyeahyLu8Qa6pd9kxVLp+voS:f96M50EY+/9S9ZEewyLu9a09o+oS

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\970238efcd912d26261bbbf976638d98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\970238efcd912d26261bbbf976638d98_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\ProgramData\kG07601NnIcP07601\kG07601NnIcP07601.exe
      "C:\ProgramData\kG07601NnIcP07601\kG07601NnIcP07601.exe" "C:\Users\Admin\AppData\Local\Temp\970238efcd912d26261bbbf976638d98_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\kG07601NnIcP07601\kG07601NnIcP07601

    Filesize

    192B

    MD5

    9173b0d0b94d4578aea232094ca564de

    SHA1

    0f8028bc6c9ac4f6b511e2f39f083a19f5be9a39

    SHA256

    966e2ac768b581930ebc6079459edd38d02165be043aeb709017834ca15a3c00

    SHA512

    a75c511df0c75b047cc02d70f0452959d106fb6a7edf06996d5995319bd32a57866371afd462eda4806ec69b330b5fcbf1cc82a21ec24b0d40ae769ce590085f

  • \ProgramData\kG07601NnIcP07601\kG07601NnIcP07601.exe

    Filesize

    376KB

    MD5

    d23b506385dccaa877b87358e94cb972

    SHA1

    af81814fc76fd4337d321b55a36384f228b6bdef

    SHA256

    561a0e27067cca0c5530bbd6056fcc72b6a8d13b57a9f895631e89835b8e0c4c

    SHA512

    99cf225f25f3b7413545eb880acfffb69c6158b905f7623088bf56b3b97172628d9e4e747fe52044ea90e364c1b8e2363ac9da2bd23c0802dcc70dd738a74ff0

  • memory/448-5-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/448-0-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/448-2-0x00000000004D0000-0x0000000000523000-memory.dmp

    Filesize

    332KB

  • memory/448-16-0x00000000029E0000-0x0000000002AAD000-memory.dmp

    Filesize

    820KB

  • memory/448-19-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/448-1-0x0000000001DD0000-0x0000000001E75000-memory.dmp

    Filesize

    660KB

  • memory/448-20-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2872-17-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2872-26-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2872-30-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2872-39-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB