Analysis

  • max time kernel
    142s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 04:22

General

  • Target

    add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe

  • Size

    479KB

  • MD5

    add7e22b5b93307a23ecc221cc3c4e6e

  • SHA1

    fe4b5870472dd9f3dad7974ead1fa6c2b6ff81a5

  • SHA256

    1e8c742fce5fc1a8f7026e6df573d77897a7e396dfad31a68226ce64d325db9a

  • SHA512

    50e87875c33d41843319119a336e76fbdb8e8fb53091741d07056797bb15420e4106170d408a8ef54814ba703bff221e709e84a0ef0f1f52d2f1808d872a9805

  • SSDEEP

    6144:qTOGarsHLBIDFU3g2bOqQWb8OiuzSpOuardjJkotI4hT3+HSlJRlb0ehG8Z30i:WasHFeFUQhzcouzThJkufNZJjH3Z3/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\add7e22b5b93307a23ecc221cc3c4e6e_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\svchost.exe
        C:\Windows\svchost.exe --first-run
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Windows\svchost.exe
          "C:\Windows\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\log.htm

    Filesize

    1KB

    MD5

    09b04f2311e2f1d2da39fb43666138b6

    SHA1

    a00fb6dea3d8413498cd3480b29d91656c5edcc4

    SHA256

    3f1b97b3dbb77c04ebd03ca6d51736474905114fb1d2a63726cb5aeb67173067

    SHA512

    b49679878b5c67f81feea82fb93a1a844cacf4706fb063273052b2e3260d4f703e4ee5a8c14cb805f4e9e579c8db24c9d1ebe82166b994ad7de5087054948bc6

  • C:\Windows\log.htm

    Filesize

    1KB

    MD5

    94bf5e2e097ced94991a6133e3722ad9

    SHA1

    2f9530fa5bdbb9765971421380fe65d506050764

    SHA256

    a5fabcc9b13bca25a565c031bc1ab704b6cac8d1b1f7b65b0cf2ffebba581997

    SHA512

    2b353d946de2eed432209daede9c3b074751b39029bc4dc4ca3e97981a0dcb93f6bee24fb9d0e5f3d49b405df8efa228a2f3d0dfdbcf11df3df17775fb70b899

  • C:\Windows\svchost.exe

    Filesize

    479KB

    MD5

    add7e22b5b93307a23ecc221cc3c4e6e

    SHA1

    fe4b5870472dd9f3dad7974ead1fa6c2b6ff81a5

    SHA256

    1e8c742fce5fc1a8f7026e6df573d77897a7e396dfad31a68226ce64d325db9a

    SHA512

    50e87875c33d41843319119a336e76fbdb8e8fb53091741d07056797bb15420e4106170d408a8ef54814ba703bff221e709e84a0ef0f1f52d2f1808d872a9805

  • memory/2704-11-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-5-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-23-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-20-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-17-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-3-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-14-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-46-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-8-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-24-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2704-1-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2704-29-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2892-86-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3056-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3056-27-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3060-48-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/3060-76-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB