Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 14:12

General

  • Target

    a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe

  • Size

    392KB

  • MD5

    a2db03fd15ca01e1cacbaa86ea177184

  • SHA1

    4276f7ee80169fe6ab6f094b62e2132a3c4abe42

  • SHA256

    1eb607e425dd27ab2f6b118ab17074565c3ecb9d6aeb19b5da8a8c06a8f0c2de

  • SHA512

    eef057ff068d149784dcfa8e292413c4dab7d569f5e33c804df03cbca799d884432e8f9cc1d2f3ed2ebe858cda516df47bc4ee7cffa3f4f37fe6154e6b2cc5f7

  • SSDEEP

    6144:NXAgtV2PtTgb7JYywPuKD62QvfG/6QZJXEHg2VZCpGFDhIERRBvuY6trK9:tAM6TgbBwPuKmWDTX4ZC4FVATt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\AppData\Local\Temp\a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe
      a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe
      2⤵
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe
        a2db03fd15ca01e1cacbaa86ea177184_JaffaCakes118.exe
        2⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3812
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /s C:\windows\system32\msinet.ocx
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4160
        • C:\windows\SysWOW64\svshost.exe
          C:\windows\system32\svshost.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\windows\SysWOW64\svshost.exe
            svshost.exe
            4⤵
              PID:4448
            • C:\windows\SysWOW64\svshost.exe
              svshost.exe
              4⤵
                PID:832
            • C:\Windows\SysWOW64\attrib.exe
              attrib +h +s C:\windows\system32\svshost.exe
              3⤵
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Views/modifies file attributes
              PID:3120

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\SysWOW64\svshost.exe

                Filesize

                113KB

                MD5

                e3ef79310ece52ea3d48d3e6c458b822

                SHA1

                ec6371c17d9a11e88ddab5e17603ca7d5565f0e1

                SHA256

                3246b5cba53e9e913e6926c1191f9c2d40a77e263b73d2d0ad7fa6016b88cf17

                SHA512

                a41866261c652d0585db9c16b0d7f6f6479b3e341c126718066ac8fc977117a1429dd6967abb8f0b1c8fa669e9ebc0f26cc5006e1803b5a7fc20fcce66d0d941

              • C:\windows\SysWOW64\msinet.ocx

                Filesize

                112KB

                MD5

                7bec181a21753498b6bd001c42a42722

                SHA1

                3249f233657dc66632c0539c47895bfcee5770cc

                SHA256

                73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

                SHA512

                d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

              • memory/1496-17-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB

              • memory/1496-18-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB

              • memory/1496-19-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB

              • memory/1496-21-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB

              • memory/3812-3-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/3812-6-0x0000000000400000-0x000000000043E000-memory.dmp

                Filesize

                248KB

              • memory/4576-0-0x0000000074962000-0x0000000074963000-memory.dmp

                Filesize

                4KB

              • memory/4576-1-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB

              • memory/4576-2-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB

              • memory/4576-10-0x0000000074960000-0x0000000074F11000-memory.dmp

                Filesize

                5.7MB