Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 11:10

General

  • Target

    aac6d24a00b6f107f7a8939358392200_JaffaCakes118.exe

  • Size

    635KB

  • MD5

    aac6d24a00b6f107f7a8939358392200

  • SHA1

    1d812922703606939828723842428d911f74d5ff

  • SHA256

    06371036934eefc8c4b1f7389e3be157de03b14363568f7af95f78dcc34258a0

  • SHA512

    568d4a9ba5f071bb1962d42b4aa9e509916029be1a26bb75c67f7645e391b6e7d01bdc006fd60297149cecf6548b31c8870ea1e579ea94e792fd88414a371af9

  • SSDEEP

    6144:3hOfjZXluQA/qNgSr5oK4cr76VPAa9aVO7CTaEjuG7JPSRoT1wDu7c7K:xYjTVxNgSFDzw9aVOm+EjPxSGwDZO

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 14 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aac6d24a00b6f107f7a8939358392200_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aac6d24a00b6f107f7a8939358392200_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\ctxmon.exe
      C:\Users\Admin\AppData\Local\Temp\ctxmon.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ctxmon.exe

    Filesize

    115KB

    MD5

    b41dd2240b072ec09744353fc20b7f83

    SHA1

    33ffb4d4d4cb3e38b674d71abef6e9946b0cf9a8

    SHA256

    2b8614f538c2d60ff88db94992fd42f938e444d0074308f8a02f3e7d7e38c3d3

    SHA512

    8fcc0366f7ea38b474205a6f9e1a0e7ca41dfc16be59e5c06b72eed32b83fb1936bbe1a2b9d77231dcff06d615347e51e9d0e7ec3f8fad31f42d1b4829adedd1

  • memory/2292-0-0x0000000001000000-0x00000000010A1000-memory.dmp

    Filesize

    644KB

  • memory/2292-5-0x0000000000840000-0x0000000000875000-memory.dmp

    Filesize

    212KB

  • memory/2292-9-0x0000000001000000-0x00000000010A1000-memory.dmp

    Filesize

    644KB

  • memory/2292-10-0x000000000102E000-0x0000000001030000-memory.dmp

    Filesize

    8KB

  • memory/2292-11-0x0000000000CE0000-0x0000000000D81000-memory.dmp

    Filesize

    644KB