Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 20:44

General

  • Target

    a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe

  • Size

    670KB

  • MD5

    a8240a2ab1b68fea07313677f4ba5709

  • SHA1

    03721757a34ff8d38f38379f39f704f53503b2e3

  • SHA256

    d8a22780f7d5d9422e33e74d2921c7dc515c238552f1a55373bd3ab35312981f

  • SHA512

    80d576979a82c1b1b63b6b6a3bbc54bcc00fd1626da6f8871729d11c4a661f0139a6301eb7a29f17bf68759a37993570129acdd0815c2105954c68cce7984f24

  • SSDEEP

    12288:J4fhVHl3blTMbcoS8WQD7tRbFsKptSlwLk5k2OAtYW2LTL:J+ZbMBTWQD7tRCi6wLB2OAtaLT

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Users\Admin\AppData\Local\Temp\autoload.exe
      "C:\Users\Admin\AppData\Local\Temp\autoload.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autoload.ini

    Filesize

    199B

    MD5

    0c9dabc54b2a182b67315ab5a8261d5d

    SHA1

    e348a6fe9b2d2096e451db18997b3a768342397d

    SHA256

    91d4e7eeb37b7ca178d061a5a26196bcfafeb4460c1718454aa6996eef552bdf

    SHA512

    837bf63d4baae9244198d0da2167cb77c52c0d9b6296bf3c8ff4f94fe7fe7ebccc461258c4a744a3325a6eb9017d9de78300d226e443987b559c161e6522dbf7

  • \Users\Admin\AppData\Local\Temp\autoload.exe

    Filesize

    1.0MB

    MD5

    73425df9a203c71d0c490645b79fd5bb

    SHA1

    d396e508a1b303194b69fcde01c9aea911d5c679

    SHA256

    7a2f6ab34e1aaf6f8758f5fc6414d4402435739e25c1af1d4c47bcb5753eefe7

    SHA512

    6e8533126a598cc5ad93ff2194aaece7515b132d063a0b41d4659fcf0f02235adeccb4d8a642ccb8c80dbd5c29c4ed3953090d1e4b604181774d92e1fc080a7c

  • memory/2680-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2680-15-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/2820-16-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2820-54-0x0000000000400000-0x0000000000511000-memory.dmp

    Filesize

    1.1MB

  • memory/2820-55-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2820-58-0x0000000000400000-0x0000000000511000-memory.dmp

    Filesize

    1.1MB