Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 01:18

General

  • Target

    a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    a0acbc800f424f097e86cc46f6dbc89d

  • SHA1

    9ef7ccc0d652177355791c4a1f1243d7b0d04fd6

  • SHA256

    0b97c2370eda2bef6f974851702c6cb95e997871498224d43c26152093d42c8b

  • SHA512

    ee97bd3468dc4c097ec37dc7fd7400db2b142749ba0d6f273a528b7565f8e93dc8e773962f8cb9c4495d0de74a74f9af6e84a39a5492ae65544cad88c3c2aeee

  • SSDEEP

    384:MKakE9pT5A6V6Z4LS6s/m5zLxDD6TBlgB:BBE9J5L6Zgsm5zLxDD6Tc

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:280
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\898A.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\898A.tmp.bat

          Filesize

          207B

          MD5

          b29ffbdd4ffd7f18824fb1df9f1b0a76

          SHA1

          5ea562578a6a42ad2b652107f12cc6fe210dfa20

          SHA256

          83aca7786088c40538ac7900038c365972d2c8b4146019234cbdeba3b4d9a4a8

          SHA512

          629c7bd23ed1a737d4ef1023de82c154636443e1b696c4b7b6fe71e272d06e611abc5958cb5a2fb94a9c0650e104220a3cf00b3ddc46351cae39fd50cdabe880

        • C:\Windows\SysWOW64\slbiopfs2.nls

          Filesize

          428B

          MD5

          b3a3567571d4143c292cd004e4936f96

          SHA1

          61cca5c1984fe81d3f93cb97d1d4381001845244

          SHA256

          fa9b2b45c2181f33e1a9445a4491e0c03cdf65f2722fe9123297c048599db89f

          SHA512

          ae69fd9c8f38f56df7933cbef4ac0b9314e70b0899f267a8b347e370360a3b57dddcb37e892049c832660597a5722f44243044bbb62cc4cce29d8dc9294d6319

        • \Windows\SysWOW64\slbiopfs2.dll

          Filesize

          2.5MB

          MD5

          f4df7a997bffd45f15013f0a91fbf3b4

          SHA1

          02cec1ae027b42671284979fb597fe550a4f2162

          SHA256

          5cb8e39a48065c5636775f2ee743c59cb62cbaa0bf4c77beb84c47305f66796f

          SHA512

          9ee56a290a50d706a12d8fae71b0fee4c8d06b3af20cf91233b21e0f647bbc4d81c79abe3d85a491e967451cacd7129d75808fdb2d9c1b3b01684e8cc9872f32

        • memory/280-16-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB

        • memory/280-25-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB