Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 23:21

General

  • Target

    acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    acffd07188e867b5d7f00eefe8b5f3d3

  • SHA1

    c7a8189f56472374e385fd18ec81539e9277af74

  • SHA256

    e1ae5a2aa034dd39148aa907cb79e7e7b764c3f8663e8e6f7f63360353e8c726

  • SHA512

    f899df30024c95ca3d3dd2ed4cd18c5e2677a4e7aa3ef927d49e79c420fa044e4da82a16a0f7acf8e12d8f1fc2e188abb5e2a8c5941494dc8c85ae710a652004

  • SSDEEP

    384:niJFuNlNNJr6Vxovczv3da23FYLtFSz7viPCHRHrC5:iJFadUxov8v3E23yWHvialm5

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\A229.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A229.tmp.bat

          Filesize

          207B

          MD5

          46ba1f0f9f15ae7b900b2a13256afbde

          SHA1

          c70b2bab26d1fa93c2de9f68d0eaedad2bb9aab3

          SHA256

          eaf45f311b023211a565909771e7b8dd3988315a36f3982b55cf01e64efa35a2

          SHA512

          96ec0e80800f5668934fc29e86143478bb3d6c65a1a38c139b7f40c8f79bcf2370bcd507a06d86d8302284d5de3b5b00e5bb9c17f5c26f0ce782ce1d103fdcb8

        • C:\Windows\SysWOW64\xolehlpjh.tmp

          Filesize

          2.1MB

          MD5

          cb72f0908d289ce9d21f2d33b573ba95

          SHA1

          90f693bd0a8f884f4681e8fb80159e51b51fb68f

          SHA256

          7e1fbdb30895126ed8147c769c9810588a1b720f4d162d32e3f7dd4087a2f1ae

          SHA512

          118179ce0b01914b097c5fd36b49e79c65da22b4d0f2521623ff42a483e5194d948b1c25a0f9719ff3d485594b17913065fa29823a0523cbecbed0ed1257a08d

        • memory/2852-12-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB

        • memory/2852-21-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB