Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 13:57

General

  • Target

    a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe

  • Size

    282KB

  • MD5

    a2ce6e650a6aa090d2b6411cb8599125

  • SHA1

    5cb36dcad74c647e597d0a74fa605842da6a43d8

  • SHA256

    6fba99be7371090f81077cbe3d679d57d27682d52ef96c8d962619add2170b4e

  • SHA512

    507394d3d13c1be69b110245ad46206d2bcbae3c9a7dad32d79a791c2c4904674723b72337ee56d49d6eab7d04f2c9a729e7817190a2631a2f5ebf36b7bfd936

  • SSDEEP

    6144:Dcu2JbDktc0z0FM3SybA5U7L0tIV2jq42hgN96VQ8VkmHC9E2:DSbQcg0FGS0LeIV2WDaR8V/l

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\RAV2007.BAT
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2436
  • C:\Windows\G_Server2007
    C:\Windows\G_Server2007
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\G_Server2007

    Filesize

    282KB

    MD5

    a2ce6e650a6aa090d2b6411cb8599125

    SHA1

    5cb36dcad74c647e597d0a74fa605842da6a43d8

    SHA256

    6fba99be7371090f81077cbe3d679d57d27682d52ef96c8d962619add2170b4e

    SHA512

    507394d3d13c1be69b110245ad46206d2bcbae3c9a7dad32d79a791c2c4904674723b72337ee56d49d6eab7d04f2c9a729e7817190a2631a2f5ebf36b7bfd936

  • C:\Windows\RAV2007.BAT

    Filesize

    218B

    MD5

    8c592163dfd82fc176d379d605fae6ba

    SHA1

    ca5c0f8c447d7f994c0baa929fb66139de9c497f

    SHA256

    99cd6d04422631e816aa1b9da054488dc75680ded973b9b6bca6f1c7dca4cd9f

    SHA512

    149f24d3e1ff3f4c3124ea506342ab6bacab3cabe3df0dccd6944b8b772b052de6ae0d2e1ded326f5740a6bebf2f78dbad8b79cd073bfb1276f2493e5161a175

  • memory/2556-12-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2592-14-0x0000000002140000-0x0000000002290000-memory.dmp

    Filesize

    1.3MB

  • memory/2592-15-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2592-16-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2592-19-0x000000007701F000-0x0000000077020000-memory.dmp

    Filesize

    4KB

  • memory/2592-20-0x000000007701F000-0x0000000077020000-memory.dmp

    Filesize

    4KB

  • memory/2592-18-0x0000000002140000-0x0000000002290000-memory.dmp

    Filesize

    1.3MB

  • memory/2592-21-0x0000000002140000-0x0000000002290000-memory.dmp

    Filesize

    1.3MB

  • memory/2592-22-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2592-23-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB