Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 08:42

General

  • Target

    ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe

  • Size

    4KB

  • MD5

    ae8ea3218b39e89ae9dc8a89772c07b2

  • SHA1

    037244743f5d53a9e9f0981ee40abc803b8bb5b9

  • SHA256

    56b1104267ce1341a949016b14400b2724b3cdd656f6e61aecc4781102c659f0

  • SHA512

    50fedc2ee0a16f800fbfbadfdad95a7520a242c50ac7d47c4cbadaa9bc86670a55349216863007a74c19e14304f85d5f93162cbf6aeb76d2668df1f24df01640

  • SSDEEP

    48:ZvtYWqYhUFkhpEvBJYzpRcIkhc7ZjzRxXg:Z1YWtUpXYdRcpc7ZJxQ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae8ea3218b39e89ae9dc8a89772c07b2_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\fasm2.bat
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\SOFTWARE\Microsoft\Command Processor" /v AutoRun /t REG_SZ /d "C:\Windows\system32\batinit.bat" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\fasm2.bat

    Filesize

    522B

    MD5

    96e73a368f0b01d5c280e7e9ec8a6701

    SHA1

    7a3849127b52f36a38bd6ce72af8de111587a3db

    SHA256

    bc0e1b5c93e327c064b520fac7481dda417c93cb5833df49beee82bcd7dce5ed

    SHA512

    5078742dfb67dbb9aea51357747cec8b13530e0cdc9ccf69ab31481fc47f0ac614993bae35694896a0395a00eae0f0d293e748d7563599d1de782fccd18d97e4

  • memory/2508-7-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB