Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 13:49

General

  • Target

    a2c828a5785d4c93e3d61ada08a73674_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    a2c828a5785d4c93e3d61ada08a73674

  • SHA1

    cd49e2be04e1bea2d12fc334fdf1ae749422bca1

  • SHA256

    3826140a5531868339256e5ebc447f4bdb8f8ab6be1592246f876fe71c716d7d

  • SHA512

    9427dea4bfdacae8151cc560cb3c066491740c2ab54ea18cbe0ccb1e5f5dfa1e53238c5599c997e77933fcd75be94231ce75da3047c09a8002bbe1cb2f2469dd

  • SSDEEP

    24576:9qPNm60cTkAdDiEutf6eOMlsSDf6xnChdQ69W+hceVmtlUm+hSavmj:9qVRTzKyeOMG0fUnK59Wc5mtlUhw

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2c828a5785d4c93e3d61ada08a73674_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2c828a5785d4c93e3d61ada08a73674_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      C:\Users\Admin\AppData\Local\Temp\\1.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 224
        3⤵
        • Program crash
        PID:2468
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      C:\Users\Admin\AppData\Local\Temp\\2.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2432
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5036 -ip 5036
    1⤵
      PID:3892
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k zjkxhcmk
      1⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4224

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1.exe

            Filesize

            1.3MB

            MD5

            5f1f105b4691593163bab773eb0ef7c6

            SHA1

            9a86a466d508cc566e5286dcb6757945c7571026

            SHA256

            0b2669e863ad0a297e21bc42d6de17006740fb5cf95e3ee19b1c2e0cb1547543

            SHA512

            3fb45bacf0bf0d4c675e6b3fe3e9f584925877f249d1f0a5e185c41ec626bf2aa9310537dd34b51b674d57fe2948ae583f8d2eaae99ac4b6f22c86f342970e37

          • C:\Users\Admin\AppData\Local\Temp\2.exe

            Filesize

            29KB

            MD5

            fcaa6c969183cf9330cf8435b71b9cf8

            SHA1

            c6dd5f20c40e87b7726844306ddec7691b30e536

            SHA256

            cd51a9b90f7f12a3fe39ae1d021904bb4e818033678847237e8dcad31a91053d

            SHA512

            8132ed599658a493e3d68d81f7f2d092de7180566e7f3744dc65ecb0bb25a6d2a944ca46173d01b73b167b3e327c70980b8fe3b93e65ec6cc676a8f0adbe315b

          • C:\Users\Admin\AppData\Local\Temp\temp.~exe

            Filesize

            1.4MB

            MD5

            a2c828a5785d4c93e3d61ada08a73674

            SHA1

            cd49e2be04e1bea2d12fc334fdf1ae749422bca1

            SHA256

            3826140a5531868339256e5ebc447f4bdb8f8ab6be1592246f876fe71c716d7d

            SHA512

            9427dea4bfdacae8151cc560cb3c066491740c2ab54ea18cbe0ccb1e5f5dfa1e53238c5599c997e77933fcd75be94231ce75da3047c09a8002bbe1cb2f2469dd

          • C:\Windows\SysWOW64\zjkxhcmk.dll

            Filesize

            37KB

            MD5

            8b487b4c5b56e359b5b61b7cba987725

            SHA1

            cbdd06bf74aca67aac3da73c8ed4a7b5ac94ddc1

            SHA256

            e6abaf86a2a3535e2b7635bb76cdc0e306e062ef15f7ab6e909feefe122e5080

            SHA512

            17a656c4c963978354536b3b5e1c529f67e9473e383d839026e344d4b6f4ed87bb3c145811321b529064012899c78fe41b51604a45fda39337a3feff05675c7d

          • memory/3948-0-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/3948-26-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/5036-8-0x0000000000400000-0x000000000059A000-memory.dmp

            Filesize

            1.6MB

          • memory/5036-9-0x000000000056B000-0x000000000056C000-memory.dmp

            Filesize

            4KB

          • memory/5036-11-0x0000000000400000-0x000000000059A000-memory.dmp

            Filesize

            1.6MB