Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 01:18

General

  • Target

    a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    a0acbc800f424f097e86cc46f6dbc89d

  • SHA1

    9ef7ccc0d652177355791c4a1f1243d7b0d04fd6

  • SHA256

    0b97c2370eda2bef6f974851702c6cb95e997871498224d43c26152093d42c8b

  • SHA512

    ee97bd3468dc4c097ec37dc7fd7400db2b142749ba0d6f273a528b7565f8e93dc8e773962f8cb9c4495d0de74a74f9af6e84a39a5492ae65544cad88c3c2aeee

  • SSDEEP

    384:MKakE9pT5A6V6Z4LS6s/m5zLxDD6TBlgB:BBE9J5L6Zgsm5zLxDD6Tc

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\FAEA.tmp.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\FAEA.tmp.bat

          Filesize

          207B

          MD5

          b29ffbdd4ffd7f18824fb1df9f1b0a76

          SHA1

          5ea562578a6a42ad2b652107f12cc6fe210dfa20

          SHA256

          83aca7786088c40538ac7900038c365972d2c8b4146019234cbdeba3b4d9a4a8

          SHA512

          629c7bd23ed1a737d4ef1023de82c154636443e1b696c4b7b6fe71e272d06e611abc5958cb5a2fb94a9c0650e104220a3cf00b3ddc46351cae39fd50cdabe880

        • C:\Windows\SysWOW64\slbiopfs2.nls

          Filesize

          428B

          MD5

          b3a3567571d4143c292cd004e4936f96

          SHA1

          61cca5c1984fe81d3f93cb97d1d4381001845244

          SHA256

          fa9b2b45c2181f33e1a9445a4491e0c03cdf65f2722fe9123297c048599db89f

          SHA512

          ae69fd9c8f38f56df7933cbef4ac0b9314e70b0899f267a8b347e370360a3b57dddcb37e892049c832660597a5722f44243044bbb62cc4cce29d8dc9294d6319

        • C:\Windows\SysWOW64\slbiopfs2.tmp

          Filesize

          2.3MB

          MD5

          42fee1bef3afc24a3c50cb1574eb7362

          SHA1

          dc737097d0858800ec5653ea367aa425b92e0a17

          SHA256

          a79cedfa08b613002359556a7fa0b4ea7451ca71f3fbb5bc2480d000b64ee2c3

          SHA512

          8fe01884d57e6b2209c91fb1ba19ac883b8efc0a832e8dc4b3bd5d109baad12c7b55de38499962a7f3e20c509156f50d93b1d4a2b7596727925408baebd1adcf

        • memory/208-17-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB

        • memory/208-22-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB