Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 07:02

General

  • Target

    a5d32d6f8376f8efbdb9dd8633a055d2_JaffaCakes118.exe

  • Size

    197KB

  • MD5

    a5d32d6f8376f8efbdb9dd8633a055d2

  • SHA1

    553bb1b973e8adc2b118b30af2a726ecab10858d

  • SHA256

    b16b4d62e493ea2bbfc46f458fc0bf0f5384a0590eac7bc450fa521f91fb39a4

  • SHA512

    97d79a18d18b8bd93128aa63531757a836e664e22e4292578cf261898ab36aae95c4c665d110717b3f94932ec9051a6dae15cecff323e732bf641748a1e5c391

  • SSDEEP

    3072:hGu9BlfzWIbXWm+w0J05RjuUtpjnpC5AIHQFwFBuzAWtG3BJ+ed2PoLT:h/0uoqtpzpEIGFwztGRJL0q

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5d32d6f8376f8efbdb9dd8633a055d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5d32d6f8376f8efbdb9dd8633a055d2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LOCALH~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LOCALH~1.EXE
      2⤵
      • Executes dropped EXE
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LOCALH~1.EXE

    Filesize

    19KB

    MD5

    51532e738d9eaba4381430474bf16765

    SHA1

    2f7e4d2ce59833b0847d327a503130319f029c90

    SHA256

    46f1f0c164ea8e0c16d7eb7b88e480382e09cb85b737b8155126cf9e47e4edbe

    SHA512

    21cb17984789a9718267ae9c1ccebb2d9ad905426da71d59dad5331f443a1ce66f43afea770e257ce9ee11e4de26c87fc459b303f0df7fa3faade9a99a187e8e

  • memory/2456-8-0x000007FEF59FE000-0x000007FEF59FF000-memory.dmp

    Filesize

    4KB

  • memory/2456-9-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2456-10-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2456-11-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2456-12-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2456-13-0x000007FEF59FE000-0x000007FEF59FF000-memory.dmp

    Filesize

    4KB