Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 23:59

General

  • Target

    ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe

  • Size

    679KB

  • MD5

    ad1cfb3859ce1c0e1355b0b77a84ed9f

  • SHA1

    c1780001081a0f12e9579d288a9ce2d1ecbec6da

  • SHA256

    efac694b4060efc93f322ea93b5c2734d383a3babd28421f979d2e7b4138ef6f

  • SHA512

    fae476ef039520437f0c4f394f92c97c5a9d2a8a1bd2ecb5c2935c820e657e3e8b94edeb883e74c3a06c7e1ce3ea5e18a29ec83770fe3986b0c0c982ef532af6

  • SSDEEP

    12288:GdMDRgsQVa+YDgfO7Onvt1c/ZMSYOZOLyHWmHGjYV5xIJMxfhs43H61pl7U6:uMDRgP/OmOUF6nYXUBGUVXB9hhH6rJl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
      • Deletes itself
      PID:2860
    • C:\Program Files (x86)\GalileoCleaner\systemcleaner.exe
      C:\Program Files (x86)\GalileoCleaner\systemcleaner.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Uninstall.lnk

    Filesize

    977B

    MD5

    a317c8ca449656a0f0a02a46cf20d57c

    SHA1

    81675dcd3ecf3d100b13a17ac175efb094f274d5

    SHA256

    cd9e5950a4406d00ed9891e16c7e09528fb075229fbcd8ce65ac8f939952ee81

    SHA512

    fc28ac0108274d414e454cfb1a96bc228dddce9f4efb88e6011498944e971a0a1273851d22d73ad08b0cdc8dd6c65426619d18340e5312c4399230e2eb540e21

  • C:\Users\Admin\AppData\LocalLow\.csrss_cfg

    Filesize

    274KB

    MD5

    705fee2a711cc35d38adffa1f836cfc8

    SHA1

    9e00aa9a6f3a7fef23f57764bbad3a50b1329837

    SHA256

    44fac03c31d677b4f0878caa9587308c40b8eb85f74bd4c1879fb4565512ee27

    SHA512

    e8dc4a53298e5dff457a93cea81b9aeeada710de06b6d618741a3c852e874661803065290489454ba8d5bfc4597adc3ca573eeb0da0e82643a60ab365ef1a31c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systemcleaner.lnk

    Filesize

    1KB

    MD5

    41c51b47bbfd4780f1426bef76488d3c

    SHA1

    7dfc006b982fdba3611c2bd347e2af0087c0f1a5

    SHA256

    287bf07dece78f7df5ea05b34f534139f3e9ad09f7e60eb43e2554044b14dcb7

    SHA512

    fbe114ed758a6370695b70da2e2dc307de1dd364528c4ce3ce91217a83447fd0dde9ee77fd606492efcb6a2185741a320c9aefbd16c89b0f98d075360950db48

  • C:\Users\Admin\Desktop\systemcleaner.lnk

    Filesize

    1009B

    MD5

    a4e3bdae6e95e39f1d45485fe2925137

    SHA1

    6952ff01fdfe486d0b1769d9e9157e8616ea39c2

    SHA256

    8e1f399ab9a8cbba6870d5f4403c3d36efb42e2430bd3cced5f0f793b4609713

    SHA512

    1cc9eeac45e4649cae64461f12a5dd85e5c70232a4f636fc3b616ac856b1973e5c6b0c7b405d5761106d015904d44d891e5ce94783a0360296b617bfe082303f

  • \Program Files (x86)\GalileoCleaner\systemcleaner.exe

    Filesize

    679KB

    MD5

    ad1cfb3859ce1c0e1355b0b77a84ed9f

    SHA1

    c1780001081a0f12e9579d288a9ce2d1ecbec6da

    SHA256

    efac694b4060efc93f322ea93b5c2734d383a3babd28421f979d2e7b4138ef6f

    SHA512

    fae476ef039520437f0c4f394f92c97c5a9d2a8a1bd2ecb5c2935c820e657e3e8b94edeb883e74c3a06c7e1ce3ea5e18a29ec83770fe3986b0c0c982ef532af6

  • memory/2120-20-0x0000000000860000-0x0000000000870000-memory.dmp

    Filesize

    64KB

  • memory/2120-19-0x0000000000860000-0x0000000000870000-memory.dmp

    Filesize

    64KB

  • memory/2120-29-0x00000000009D0000-0x0000000000A7D000-memory.dmp

    Filesize

    692KB

  • memory/2120-1-0x00000000000E0000-0x000000000015B000-memory.dmp

    Filesize

    492KB

  • memory/2120-31-0x00000000000E0000-0x000000000015B000-memory.dmp

    Filesize

    492KB

  • memory/2120-30-0x0000000003D70000-0x0000000003E1D000-memory.dmp

    Filesize

    692KB

  • memory/2120-5-0x0000000001E80000-0x0000000001F2D000-memory.dmp

    Filesize

    692KB

  • memory/2120-18-0x0000000000860000-0x0000000000870000-memory.dmp

    Filesize

    64KB

  • memory/2120-0-0x00000000009D0000-0x0000000000A7D000-memory.dmp

    Filesize

    692KB

  • memory/2740-39-0x0000000000260000-0x00000000002DB000-memory.dmp

    Filesize

    492KB

  • memory/2740-34-0x0000000000260000-0x00000000002DB000-memory.dmp

    Filesize

    492KB

  • memory/2740-33-0x0000000001000000-0x00000000010AD000-memory.dmp

    Filesize

    692KB

  • memory/2740-103-0x0000000000260000-0x00000000002DB000-memory.dmp

    Filesize

    492KB

  • memory/2740-132-0x0000000001000000-0x00000000010AD000-memory.dmp

    Filesize

    692KB