Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 16:39

General

  • Target

    a768d55d6dd9a6429976bbd0b8e27afe_JaffaCakes118.exe

  • Size

    295KB

  • MD5

    a768d55d6dd9a6429976bbd0b8e27afe

  • SHA1

    dae1b3fd02ab20c1bead9aed8a4d30823ce33300

  • SHA256

    cc5929125d4a68c43fc5ec735414eda1067e22a4e936e3eb5e2adf4a5fc5f85d

  • SHA512

    64abd3e469a51b59ec8bf8ba41e4473bfcf7bc8eb1ef7287849923a829680d42ed7847c853fce536ab35131f9d97ff4469a1fd6fb86d6c4a293fd6f9dfd35351

  • SSDEEP

    6144:03K/2Va11/9uXe2LEvWhvFHpuoL5PHH/MlH8MR2184sidQafG07oS:03da/9Se2PhvFQqMdWFZpfZ7oS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a768d55d6dd9a6429976bbd0b8e27afe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a768d55d6dd9a6429976bbd0b8e27afe_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088
  • C:\Program Files (x86)\WinRar\UnRAr.exe
    "C:\Program Files (x86)\WinRar\UnRAr.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of FindShellTrayWindow
    PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WinRar\UnRAr.exe

    Filesize

    295KB

    MD5

    a768d55d6dd9a6429976bbd0b8e27afe

    SHA1

    dae1b3fd02ab20c1bead9aed8a4d30823ce33300

    SHA256

    cc5929125d4a68c43fc5ec735414eda1067e22a4e936e3eb5e2adf4a5fc5f85d

    SHA512

    64abd3e469a51b59ec8bf8ba41e4473bfcf7bc8eb1ef7287849923a829680d42ed7847c853fce536ab35131f9d97ff4469a1fd6fb86d6c4a293fd6f9dfd35351

  • memory/2088-0-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2088-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2088-6-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2476-4-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2476-8-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2476-10-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2476-13-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2476-17-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2476-21-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB