Analysis

  • max time kernel
    116s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 19:17

General

  • Target

    97574acd95fbd45e7c157a2526ba178a_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    97574acd95fbd45e7c157a2526ba178a

  • SHA1

    3deb5ff3a5648d401fbffc34b969e35ab85fd586

  • SHA256

    f5a6ae461e5b7b780899d65255301f2e42b64f4daf870125ffce83565179f2b3

  • SHA512

    58aa085bcf58fb7f78dd0823521ff33924dfaa75c792ecb041e7cead000eafc86dcf7fd31467e3e011c917ce1b6b0d67e16d28e0ca84266316816a2e4b11c2e7

  • SSDEEP

    3072:6yUUrD81bevblejEAB/zCIK2RSFeLMhd/f5xzyCrTUQBVehJZv9xJTKTtg18AH3t:6yZrQ1bejlejEiLKaWeL+/xxmATUkVeH

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97574acd95fbd45e7c157a2526ba178a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\97574acd95fbd45e7c157a2526ba178a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\97574acd95fbd45e7c157a2526ba178a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\97574acd95fbd45e7c157a2526ba178a_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf183eeb4ca761744e467f0b0c21ff61

    SHA1

    9839fb3efb6df703ef408bb67587e4cafe3ca19d

    SHA256

    6c97bb3aba3866b7def6b6cf40af92c54045e001c13387b1f8462bfe6fccf387

    SHA512

    95595c669dbc3f7928f170cd169ccf906050c7a4e77c5ab2df68d85332f0c5e7281bd3562ca8f7e715088d4101bd9b9867d682e97af8d4c715586d3636dd8a3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1471e13cd19590ceec8d331f097b2994

    SHA1

    1f4ee91d53cb345e9dc2818b76cb211f3bdf5035

    SHA256

    644de6adad15e65468e109fc79ac9764f1a26a8a2a29c02ef25392cdd1161f66

    SHA512

    7288560212b94e4709fca05b82ae32760ead0da121a0c100d30b5d8bec2c409db25eaf1f52f8917b725cdd429f5a306e6f517231d6a9a67d07c4c2b94a2397b6

  • C:\Users\Admin\AppData\Local\Temp\97574acd95fbd45e7c157a2526ba178a_JaffaCakes118.exe

    Filesize

    191KB

    MD5

    a0dc83333cf58b06a9b1123e2debcf8a

    SHA1

    d8a008a3b6e39797204c2495eff7ba469428cd06

    SHA256

    12436178ac4e544f7a1ab7f517c626eb2a48c4e5d249aaff0de64571e4db0931

    SHA512

    c38d864f3c3367ba4c1a67c2f7f2c420925ac3f68fae4b3cae18dd6bac290dc95d562acfd79a495c81c80fddf09aa89cb2a89f4cff49bbfe41def593c2976ddb

  • C:\Users\Admin\AppData\Local\Temp\CabBD1A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBD2C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2240-17-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2240-24-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2240-120-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2244-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2244-16-0x0000000001490000-0x0000000001516000-memory.dmp

    Filesize

    536KB

  • memory/2244-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2244-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2244-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB