Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 14:55

General

  • Target

    a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe

  • Size

    333KB

  • MD5

    a71745e77adbb1a39516e7f401613a64

  • SHA1

    51a09e77443688c33ea179c56eb8e7c443b12941

  • SHA256

    3bd8a12537c6c7eca1df5311be5fb6ed8f4cbe5fcc45e4eba701b241de7c546e

  • SHA512

    ac2df46aeaf8f077e558f29be4af27359f3c7e5cda0a3d6390b5492884fcea80e7bdd0774d29f0da02f165083e203b7d0f57cd0453fc8ced0e3cbcd4508b6884

  • SSDEEP

    6144:l80UKaRzEfyG+16F1xx+rHMYbvcOdNS0KCGOgmLArll67y0vAbGRB1zed:l80UKaRIM16Dxxsxvck6Ogm6ll62oRj6

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1204
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\a71745e77adbb1a39516e7f401613a64_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2164
            • C:\Users\Admin\AppData\Roaming\Kaid\xokaca.exe
              "C:\Users\Admin\AppData\Roaming\Kaid\xokaca.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2152
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp67921ab8.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2728
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1372

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp67921ab8.bat

            Filesize

            271B

            MD5

            122ceeb7ac1c7f5fdf7dbcd4344347bf

            SHA1

            905af4e5706a16bca1326516731f33609311170b

            SHA256

            c47024eb108c16e93a800a0a5a7ebf6b4c8894a2c2250e26ba369f25fe38180d

            SHA512

            ba0b8a27b394a2a7a542c5e38e6d2f561402c40ab94998d34df88cfa0e51252514d5fbb58d7d249f54641429f313dcf6f3c157017d8fa4a1e05b84d794e63b1a

          • \Users\Admin\AppData\Roaming\Kaid\xokaca.exe

            Filesize

            333KB

            MD5

            5b35d4b38c2d6d02eeb0e46ba546fa63

            SHA1

            f26d5f924f9da7722f6b40f5c08470344c172969

            SHA256

            2918298a15447f9d7dfe47a4527526570c294a00faf6e4f509050760da91eb47

            SHA512

            ec7587292f0bf9b52e78b66a632f16b10d1ea418190a38dc59f1cef5f8a4992b325221538cda1c94f2bc969a5885fcc3a76acb366c4c571ba6dbff7663efd756

          • memory/1120-15-0x00000000020D0000-0x0000000002112000-memory.dmp

            Filesize

            264KB

          • memory/1120-21-0x00000000020D0000-0x0000000002112000-memory.dmp

            Filesize

            264KB

          • memory/1120-19-0x00000000020D0000-0x0000000002112000-memory.dmp

            Filesize

            264KB

          • memory/1120-17-0x00000000020D0000-0x0000000002112000-memory.dmp

            Filesize

            264KB

          • memory/1120-23-0x00000000020D0000-0x0000000002112000-memory.dmp

            Filesize

            264KB

          • memory/1204-29-0x00000000001B0000-0x00000000001F2000-memory.dmp

            Filesize

            264KB

          • memory/1204-27-0x00000000001B0000-0x00000000001F2000-memory.dmp

            Filesize

            264KB

          • memory/1204-33-0x00000000001B0000-0x00000000001F2000-memory.dmp

            Filesize

            264KB

          • memory/1204-31-0x00000000001B0000-0x00000000001F2000-memory.dmp

            Filesize

            264KB

          • memory/1256-36-0x0000000002DD0000-0x0000000002E12000-memory.dmp

            Filesize

            264KB

          • memory/1256-37-0x0000000002DD0000-0x0000000002E12000-memory.dmp

            Filesize

            264KB

          • memory/1256-38-0x0000000002DD0000-0x0000000002E12000-memory.dmp

            Filesize

            264KB

          • memory/1256-39-0x0000000002DD0000-0x0000000002E12000-memory.dmp

            Filesize

            264KB

          • memory/1372-44-0x0000000001E40000-0x0000000001E82000-memory.dmp

            Filesize

            264KB

          • memory/1372-41-0x0000000001E40000-0x0000000001E82000-memory.dmp

            Filesize

            264KB

          • memory/1372-42-0x0000000001E40000-0x0000000001E82000-memory.dmp

            Filesize

            264KB

          • memory/1372-43-0x0000000001E40000-0x0000000001E82000-memory.dmp

            Filesize

            264KB

          • memory/2152-277-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/2152-278-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2152-13-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2152-12-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/2164-135-0x0000000077CE0000-0x0000000077CE1000-memory.dmp

            Filesize

            4KB

          • memory/2164-72-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-51-0x0000000002310000-0x0000000002352000-memory.dmp

            Filesize

            264KB

          • memory/2164-49-0x0000000002310000-0x0000000002352000-memory.dmp

            Filesize

            264KB

          • memory/2164-48-0x0000000002310000-0x0000000002352000-memory.dmp

            Filesize

            264KB

          • memory/2164-55-0x0000000002310000-0x0000000002352000-memory.dmp

            Filesize

            264KB

          • memory/2164-56-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-58-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-60-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-64-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-66-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-68-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-70-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-53-0x0000000002310000-0x0000000002352000-memory.dmp

            Filesize

            264KB

          • memory/2164-74-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-76-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-1-0x0000000000370000-0x00000000003C9000-memory.dmp

            Filesize

            356KB

          • memory/2164-62-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-7-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2164-4-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2164-136-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2164-158-0x0000000000370000-0x00000000003C9000-memory.dmp

            Filesize

            356KB

          • memory/2164-159-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2164-3-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2164-2-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2164-0-0x0000000000320000-0x0000000000362000-memory.dmp

            Filesize

            264KB