Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 21:30

General

  • Target

    aca8ad78cc08a4522a6c266d9bb8d98a_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    aca8ad78cc08a4522a6c266d9bb8d98a

  • SHA1

    ce71c1ef655cf1b87a7f6e0670f2d1872a486c11

  • SHA256

    df6bee5ce89b21d8126f40bc6b816fccf04bf08ad319d66415edb33241cc79d6

  • SHA512

    b2f54c9fc8619a7f36d0e73405888aaa8fd295c119e995608e8009f44467b1e2e901d5a9b6f83f4f4251a9ae56cbe930940b070bac6467a33fae10d27a9c771f

  • SSDEEP

    384:WZUj/gLh4iRp3Tn9N1GvHw5Uw0B5mKDkAEx4L:eU8LyiPDlGvHAUwrKjE2

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aca8ad78cc08a4522a6c266d9bb8d98a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aca8ad78cc08a4522a6c266d9bb8d98a_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\C9E.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C9E.tmp.bat

    Filesize

    207B

    MD5

    f131de025ac843b493adc74bc6421d0b

    SHA1

    1f679dc460199ba8bfaa232774eebc8957034326

    SHA256

    4d2f3c1564aa0071ac44e64688017df9419517ed55a22070d4bb265c5df4716b

    SHA512

    ab1d4bc304e92e7ac2114ca496356e0cb0032ebb840a399167e5f261225264f0fe552974822be89c75bf0ced02a0f6f41495fd918546c1db656729cde03e6763

  • C:\Windows\SysWOW64\ilfaolgz.tmp

    Filesize

    2.3MB

    MD5

    2a470db4206907641b0b9a009c160842

    SHA1

    efe2094f1fbef385075c06abb092036f5f06ddd5

    SHA256

    f628d2f6be09ebfa41d37833d30c6527e405e01ebb5c5cc97df67e3015a7f4d3

    SHA512

    171a94c11250797fa5efc4eb01aec742aa71fb6a527a784c5f780b8fff6d219cec757a85cbd89b389a333cd69bf3bc335a095829d26d68e1ac487a203e8ea564

  • memory/2120-8-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2120-17-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB