Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 20:29

General

  • Target

    9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe

  • Size

    226KB

  • MD5

    9fd1e73df5506f0713084a8d0b1ab3bc

  • SHA1

    8f8a3a2720cbe3d46a0ac113f8e27c048697986e

  • SHA256

    6286029b9ccc01e84ab8d7afbac5141a32c3ab44895f17054a186666fbd83220

  • SHA512

    c81a1ae30a60a1a99f95c24e45d2a39522080a87ca6be9e0825e027718739dedfd33baabb23e6e69b23f586e1dc55362fbb9110487c9daed1fb9004a44336698

  • SSDEEP

    3072:hhPeTUDv6sqVEZWbRF7jmXPizMHSyxzpYKuNvC+czAx8gRKehSFaQaqUJXJ6U9xr:nnSsqVcWbL+fiI9Y9a+czAxbCNCr

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\dplaysvr.exe
      "C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of UnmapMainImage
      PID:1916
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\dplaysvr.exe

          Filesize

          106KB

          MD5

          b5a19bf6451659da9904e5498bd07e65

          SHA1

          7720652d79442998cce9eb66987151ee4c36c5af

          SHA256

          a77ef1959c358480156162fd4012271a825613b09129d172ac26ed7d9d1f070b

          SHA512

          6710e32a206942a13f06005c52669b01e265e3b9b8c86790b1703741f26cc071f609202e21ab7ccb34a64c7225b0f95db25717d4da4546202d8a01d82fab7b6f

        • C:\Users\Admin\AppData\Local\dplayx.dll

          Filesize

          51KB

          MD5

          026595cc3cfe89b58fbfb8864a79daf8

          SHA1

          cdfb4d84eedc48f8c6d929d4eb222dbb1a8d5ebf

          SHA256

          55a0911c9b7e10eefce40ae76b75f5fd556ea585b5f7bd7ad0aa381f81203065

          SHA512

          9f2338cbaeea6cb148a163ac1ba73f51eb4f2b09ad163f14e6fdb3a679e47f4bcbb9ad413fbc3844c57fde2aa67548948aeffc32499557fe27695d1e1954b0d3

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          882B

          MD5

          4049190d921e21ce622e8d7948ad0628

          SHA1

          a9e441f2a373fe2c529cdcbef540de0a55aef7f6

          SHA256

          29a86b660744bc389864b1253b9d8c26ab47058b86d1ea7c0d5b4c3b934cdc22

          SHA512

          b1699acac56dbdfc582127c97f3f2893f65d0c5bc074cf1e84cc5c1b01e79181c6b8b712748667d9b9d8164ffdb0838f7a65c2a3be1938f833eeefc90627c3bd

        • memory/1916-24-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1916-25-0x00000000004C0000-0x00000000004C9000-memory.dmp

          Filesize

          36KB

        • memory/1916-23-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3068-5-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3068-4-0x00000000004C0000-0x00000000004FF000-memory.dmp

          Filesize

          252KB

        • memory/3068-3-0x0000000000440000-0x0000000000473000-memory.dmp

          Filesize

          204KB

        • memory/3068-21-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3068-26-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB