Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 12:38

General

  • Target

    ab0e1e7583853df3e7e26ae39477ac89_JaffaCakes118.exe

  • Size

    293KB

  • MD5

    ab0e1e7583853df3e7e26ae39477ac89

  • SHA1

    835da340ce9666ddcb453cbf1239a2340ab03078

  • SHA256

    26146a46ff2990a55f8b39e3e82cec70c188af06b029e23f845a97460640042d

  • SHA512

    14b34441ae6ac242bb7409195e6c47bbc6b928872f98241baf94dd60bc88294eacc16316075b6534c6a2af23a1a917af3865606c6c80922855f8dbce0c858bcc

  • SSDEEP

    6144:TmDCJ7hG5hN9uJ4Xt0hfGLvVyWQZcweH6IPX38cuHCm:qDC14bGJg7ZrQZcjH3P3iHCm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0e1e7583853df3e7e26ae39477ac89_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0e1e7583853df3e7e26ae39477ac89_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2632
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\WINDOWS\SysWOW64\ctfmon.exe
      C:\WINDOWS\system32\ctfmon.exe
      2⤵
        PID:2704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\svchost.exe

      Filesize

      293KB

      MD5

      ab0e1e7583853df3e7e26ae39477ac89

      SHA1

      835da340ce9666ddcb453cbf1239a2340ab03078

      SHA256

      26146a46ff2990a55f8b39e3e82cec70c188af06b029e23f845a97460640042d

      SHA512

      14b34441ae6ac242bb7409195e6c47bbc6b928872f98241baf94dd60bc88294eacc16316075b6534c6a2af23a1a917af3865606c6c80922855f8dbce0c858bcc

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      d99d6b4bfb9a3bda30035edca5ac986e

      SHA1

      0e3818253b385ffae575c8d0e7579d18e9234e5c

      SHA256

      17a17a08ee28b2fbb4b989f542e05b5bb0e8611b549c4613137be7dab1c87bf8

      SHA512

      09c370817a655de41525f5835af2845e9c1512077b373260d81f34ccdc3c6ddff94872687ab99d16d3a4ca7b955f6e3fcab013fc688654007acc70339370701b

    • memory/2372-0-0x0000000000400000-0x000000000051B200-memory.dmp

      Filesize

      1.1MB

    • memory/2372-1-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2372-2-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/2372-3-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2372-16-0x0000000000400000-0x000000000051B200-memory.dmp

      Filesize

      1.1MB

    • memory/2704-15-0x0000000000400000-0x000000000051C000-memory.dmp

      Filesize

      1.1MB

    • memory/2704-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2704-13-0x0000000000400000-0x000000000051C000-memory.dmp

      Filesize

      1.1MB

    • memory/2744-8-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/2744-9-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2744-7-0x0000000000400000-0x000000000051B200-memory.dmp

      Filesize

      1.1MB

    • memory/2744-26-0x0000000000400000-0x000000000051B200-memory.dmp

      Filesize

      1.1MB