Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 18:13

General

  • Target

    a7b11e73847ad3990ddae2e95e9769a3_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    a7b11e73847ad3990ddae2e95e9769a3

  • SHA1

    c424dc367204e65823c76388cddcb289522c23cc

  • SHA256

    d8c9df3113869c0afa926ffa254f3bf4349a64b139b2f5e390af4cdd927edf41

  • SHA512

    94c2567b170552e3e94018d8957a169d31480daada9acc61fea665be4a3f651b2b7ffca884514fb6f4156f8d09e98cd7e24b0c9f9458d31247783765d8008381

  • SSDEEP

    768:IuIsrZYXqZT8zEFtoiv40eDMhSSgnbcuyD7U+f:IqrZcOfv40eDkgnouy8+f

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7b11e73847ad3990ddae2e95e9769a3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a7b11e73847ad3990ddae2e95e9769a3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\ctfmon.exe
      "C:\Windows\ctfmon.exe"
      2⤵
      • Executes dropped EXE
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\ctfmon.exe

    Filesize

    189KB

    MD5

    f2c7bb8acc97f92e987a2d4087d021b1

    SHA1

    7eb0139d2175739b3ccb0d1110067820be6abd29

    SHA256

    142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2

    SHA512

    2f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8

  • \Users\Admin\AppData\Local\Temp\259414764n18.dll

    Filesize

    34KB

    MD5

    d12caad916d75bf0ddeb0d28e309c8ff

    SHA1

    ca8dea7a6dd2bcf47160670b5a26947914dbb9c1

    SHA256

    ff38af439f77040321eefe29a84e99a059da0f8a95a7af8e7d5d64353707c07e

    SHA512

    c108f56bcc10f1072d53d49273dd6cd9d45def63b0f2e4d5c5473af340959d238d95227fab26f76a1dcc8f649598b8b7c2424e59ee39698f912cce5b8b2c7566

  • memory/2652-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2652-10-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB