Analysis

  • max time kernel
    18s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 08:32

General

  • Target

    ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe

  • Size

    789KB

  • MD5

    ae879c03604460a9b75c4f2e8bbbdf04

  • SHA1

    251af5e14d8a1fa245cc25044b5722e8b46c0b2d

  • SHA256

    607172e9a827f5f99054cc6eebaed1dd623d8f7f96a8a533ef14aadd0177e74c

  • SHA512

    3d75169449577c57e23926fb8fcd1101782dfd84dc03d738d1bc536f04aedcfe3e9661725d82fd953c52f5aae8b46a7661e0f47b61fde77ac2eb8f5e43fcdb68

  • SSDEEP

    12288:0tobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44E4:0t8RHjEgYAw1hZlZTWQu7igcyKPEujZ

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nseACC.tmp/fallbackfiles/'
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\31919.bat" "C:\Users\Admin\AppData\Local\Temp\25E201EEEE6A486FB51394C95B3FBCB9\""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:840
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2248

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\$I3D4CNQ

          Filesize

          544B

          MD5

          b0424849698ad4ada2a4445e7051bd85

          SHA1

          5ff8320b0ce90534558013004c7d2c2d6a4e4892

          SHA256

          23f31ed020f580c5f7e03a64f7f41b08db7f55027ca45012e27415c1761da83f

          SHA512

          af5752b82aa207c1099c0aea901dea3d26f32bc4fbbd6e2267765b92bc065a1b46ec32eb11a2b79357a69038a7f9acd06210a3dee3e149cf36ecb8c3e3886268

        • C:\Users\Admin\AppData\Local\Temp\25E201EEEE6A486FB51394C95B3FBCB9\25E201EEEE6A486FB51394C95B3FBCB9_LogFile.txt

          Filesize

          9KB

          MD5

          ead28df49613609da4a056aed95a29d2

          SHA1

          0e9611965b77d01bfcd4e061ce24c8f6c3f13a70

          SHA256

          2c53182f35c068f88eb5c7a8446025f898d3e6d57ec7320241d2d3c7b1f52845

          SHA512

          b7cebd9ca7da27d4c39fc59a8f3d76138537390a1e1928a8b9fec8729d766f88577b8a86df10af8a422f6d7238dbe15c57ea83f70da2cde41f3ff51eb04242ed

        • C:\Users\Admin\AppData\Local\Temp\25E201EEEE6A486FB51394C95B3FBCB9\25E201~1.TXT

          Filesize

          119KB

          MD5

          09c69b1c9c5bae7605d329009d3c5c14

          SHA1

          1c48732dd5a2d064fcf36c528b15de46d7a27e56

          SHA256

          85383894894eeaba7092293b36328ee67186e28c83c36fc75b26f22ad6766bb2

          SHA512

          17eb3d18d25f08bb6e605201abeebbe038fd4558c9f5c6edeee29fc69c22c12e8b1ff6be43e296d4dd6eb9c60b61b685c63e87587f67e912b6405bba11f46caa

        • C:\Users\Admin\AppData\Local\Temp\31919.bat

          Filesize

          212B

          MD5

          668767f1e0c7ff2b3960447e259e9f00

          SHA1

          32d8abf834cce72f5e845175a0af2513b00504d8

          SHA256

          cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

          SHA512

          c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

        • C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118_icon.ico

          Filesize

          17KB

          MD5

          055c2cb77fa2edc2802b7fd397b9c213

          SHA1

          e6bf5af3427539bf609cfb8904b35803a06104d3

          SHA256

          78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

          SHA512

          7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

        • C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118_splash.png

          Filesize

          12KB

          MD5

          fe272d040e82704707b19bfbf29d65ca

          SHA1

          460de628ea63986a7e6390a1623d8ba32dc82aee

          SHA256

          1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

          SHA512

          8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

        • \Users\Admin\AppData\Local\Temp\nseACC.tmp\StdUtils.dll

          Filesize

          14KB

          MD5

          21010df9bc37daffcc0b5ae190381d85

          SHA1

          a8ba022aafc1233894db29e40e569dfc8b280eb9

          SHA256

          0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

          SHA512

          95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

        • \Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe

          Filesize

          1.8MB

          MD5

          9ab5db4bb5971035b4d287d64f9676b5

          SHA1

          33d17f016339572dd05c124d6243fffefd0cd039

          SHA256

          f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

          SHA512

          d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

        • memory/2440-81-0x0000000000C50000-0x0000000000C51000-memory.dmp

          Filesize

          4KB

        • memory/2440-221-0x0000000000C50000-0x0000000000C51000-memory.dmp

          Filesize

          4KB

        • memory/2452-304-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2452-220-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB