Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 13:18

General

  • Target

    ab2cd84de81cf3f16cd1b783f6b08a4f_JaffaCakes118.exe

  • Size

    29KB

  • MD5

    ab2cd84de81cf3f16cd1b783f6b08a4f

  • SHA1

    750b96eeb3d4e1d6ddc0cac3a78693135e8b0a63

  • SHA256

    ecc3d7085a56f8623f5f4d1881278e8b562980fedfaca55823d1ac5fc3979824

  • SHA512

    aedbebaa3f07e03021232cf249eb74a451600c620318fe0807e98739c2f85e751088b261294c30c88a5fcff120ef7f88ee4e91513ebfc71387fd188abda71590

  • SSDEEP

    768:IFpoxeFRQ7SW5LBCp2KkyF7QCmYEw59JS7Fp:qpmefQ7bVKRQCmYEwvJS7Fp

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab2cd84de81cf3f16cd1b783f6b08a4f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab2cd84de81cf3f16cd1b783f6b08a4f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\cenbeznk.exe
      C:\Windows\system32\cenbeznk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:2028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\ab2cd84de81cf3f16cd1b783f6b08a4f_JaffaCakes118.exe.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ab2cd84de81cf3f16cd1b783f6b08a4f_JaffaCakes118.exe.bat

    Filesize

    210B

    MD5

    128f6c4108aec0fba4dc68a6c2771fa1

    SHA1

    e2b5731b411e0f717da23bc7d562933365defa47

    SHA256

    55472084f59601ff29b72b001bdc183aa49e7d63dab89a95da8515bf43091123

    SHA512

    085cda44cca7156044f48ffae9c36f9792952479df7065f674be4817bce3e4e6fd7f2ed1e1ae13e791016eb5e7a5dfe653e4ab7086ff70cfb2197951d69aed32

  • C:\Windows\SysWOW64\cenbeznk.exe

    Filesize

    29KB

    MD5

    ab2cd84de81cf3f16cd1b783f6b08a4f

    SHA1

    750b96eeb3d4e1d6ddc0cac3a78693135e8b0a63

    SHA256

    ecc3d7085a56f8623f5f4d1881278e8b562980fedfaca55823d1ac5fc3979824

    SHA512

    aedbebaa3f07e03021232cf249eb74a451600c620318fe0807e98739c2f85e751088b261294c30c88a5fcff120ef7f88ee4e91513ebfc71387fd188abda71590

  • memory/2028-15-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2780-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2780-11-0x00000000001C0000-0x00000000001D1000-memory.dmp

    Filesize

    68KB

  • memory/2780-10-0x00000000001C0000-0x00000000001D1000-memory.dmp

    Filesize

    68KB

  • memory/2780-12-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2780-14-0x00000000001C0000-0x00000000001D1000-memory.dmp

    Filesize

    68KB

  • memory/2780-13-0x00000000001C0000-0x00000000001D1000-memory.dmp

    Filesize

    68KB