Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 06:16

General

  • Target

    a5b29dc1915c9126c15108806224b443_JaffaCakes118.exe

  • Size

    128KB

  • MD5

    a5b29dc1915c9126c15108806224b443

  • SHA1

    e1ac365fdf94bd0ae746e2e1c2b708274ca67523

  • SHA256

    bb4a677f60fc4cb80156314d2830df5ee65dae16520dcf17dabc6338399a1c27

  • SHA512

    c0a22ddc964e92444bf5ff6862d6890fc633b2859838af17d24870e1a47e5c7bb9a2d57eb8013f13bfd8cf177b2da9c055e23010a9f23c29659b2ec60cc9ee57

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5b29dc1915c9126c15108806224b443_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5b29dc1915c9126c15108806224b443_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$$$$$.bat

          Filesize

          228B

          MD5

          d1890cf9a673eda997397a428c9a7d9c

          SHA1

          e3bcec2a3e8cb8eb627b31ffeef65e5351dbddb1

          SHA256

          7f60abd883d204b8bbab3d00134394fa28ca2dfd3da8e477b22edf3c76ae36f6

          SHA512

          5c5efd8ca15f6f24951d9361307cbe935ca3464d8eb4657a4142e59c48f9ccb7c4a9c5fb3040ef1c6185d6eec9c79f0d8d52e46bdaa3179107ba9b817d1e1cf5

        • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

          Filesize

          128KB

          MD5

          a5b29dc1915c9126c15108806224b443

          SHA1

          e1ac365fdf94bd0ae746e2e1c2b708274ca67523

          SHA256

          bb4a677f60fc4cb80156314d2830df5ee65dae16520dcf17dabc6338399a1c27

          SHA512

          c0a22ddc964e92444bf5ff6862d6890fc633b2859838af17d24870e1a47e5c7bb9a2d57eb8013f13bfd8cf177b2da9c055e23010a9f23c29659b2ec60cc9ee57

        • memory/3056-3-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3056-537-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3056-826-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB